|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn798669681 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
120710s2012 caua o 001 0 eng d |
010 |
|
|
|a 2012000214
|
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d STF
|d COO
|d C6I
|d E7B
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d YDXCP
|d OCLCQ
|d OCLCF
|d TEFOD
|d OCLCQ
|d AZK
|d N$T
|d LOA
|d AGLDB
|d JBG
|d OCLCQ
|d COCUF
|d ICA
|d CNNOR
|d OCLCQ
|d MOR
|d CCO
|d PIFAG
|d LIV
|d OCLCQ
|d OCLCA
|d WRM
|d BRL
|d CEF
|d NRAMU
|d VT2
|d OCLCQ
|d WYU
|d UAB
|d A6Q
|d YDX
|d UKAHL
|d UKCRE
|d OCLCA
|d CZL
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 961575987
|a 962692732
|a 965981338
|a 988437850
|a 992110935
|a 1037792030
|a 1038586081
|a 1039102477
|a 1045527386
|a 1062933602
|a 1081279942
|a 1083593441
|a 1103261489
|a 1119642981
|a 1120086749
|a 1129357710
|a 1152977653
|a 1153501171
|a 1192343248
|a 1228538938
|a 1240532159
|
020 |
|
|
|a 9781593272906
|q (electronic bk.)
|
020 |
|
|
|a 1593272901
|q (electronic bk.)
|
020 |
|
|
|z 9781593274306
|
020 |
|
|
|z 1593274300
|
029 |
1 |
|
|a AU@
|b 000049904084
|
029 |
1 |
|
|a AU@
|b 000053284424
|
029 |
1 |
|
|a AU@
|b 000062346929
|
029 |
1 |
|
|a DEBBG
|b BV040901993
|
029 |
1 |
|
|a DEBSZ
|b 378294369
|
029 |
1 |
|
|a DEBSZ
|b 381380564
|
029 |
1 |
|
|a DEBSZ
|b 484709348
|
029 |
1 |
|
|a NZ1
|b 14691460
|
029 |
1 |
|
|a AU@
|b 000067093507
|
029 |
1 |
|
|a AU@
|b 000059374529
|
035 |
|
|
|a (OCoLC)798669681
|z (OCoLC)961575987
|z (OCoLC)962692732
|z (OCoLC)965981338
|z (OCoLC)988437850
|z (OCoLC)992110935
|z (OCoLC)1037792030
|z (OCoLC)1038586081
|z (OCoLC)1039102477
|z (OCoLC)1045527386
|z (OCoLC)1062933602
|z (OCoLC)1081279942
|z (OCoLC)1083593441
|z (OCoLC)1103261489
|z (OCoLC)1119642981
|z (OCoLC)1120086749
|z (OCoLC)1129357710
|z (OCoLC)1152977653
|z (OCoLC)1153501171
|z (OCoLC)1192343248
|z (OCoLC)1228538938
|z (OCoLC)1240532159
|
037 |
|
|
|a CL0500000152
|b Safari Books Online
|
037 |
|
|
|a 91210B70-84CD-4EBF-A95F-BABAAA1CCE27
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.76.C68
|b S534 2012
|
072 |
|
7 |
|a COM
|x 015000
|2 bisacsh
|
080 |
|
|
|a 004.491.22
|
082 |
0 |
4 |
|a 005.8/4
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sikorski, Michael.
|
245 |
1 |
0 |
|a Practical malware analysis :
|b the hands-on guide to dissecting malicious software /
|c by Michael Sikorski and Andrew Honig.
|
260 |
|
|
|a San Francisco :
|b No Starch Press,
|c 2012.
|
300 |
|
|
|a 1 online resource (xxxi, 766 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed November 14, 2016).
|
505 |
0 |
|
|a pt. 1. Basic analysis -- pt. 2. Advanced static analysis -- pt. 3. Advanced dynamic analysis -- pt. 4. Malware functionality -- pt. 5. Anti-reverse-engineering -- pt. 6. Special topics.
|
520 |
|
|
|a There are more than 100 malicious computer attacks every second, resulting in tens of billions of dollars in economic damages each year. Among security professionals, the skills required to quickly analyze and assess these attacks are in high demand. Practical Malware Analysis provides a rapid introduction to the tools and methods used to dissect malicious software (malware), showing readers how to discover, debug, and disassemble these threats. The book goes on to examine how to overcome the evasive techniques?stealth, code obfuscation, encryption, file packing, and others?that malware author.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Malware (Computer software)
|
650 |
|
0 |
|a Computer viruses.
|
650 |
|
0 |
|a Debugging in computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Logiciels malveillants.
|
650 |
|
6 |
|a Virus informatiques.
|
650 |
|
6 |
|a Débogage.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Viruses & Malware.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computer viruses.
|2 fast
|0 (OCoLC)fst00872684
|
650 |
|
7 |
|a Debugging in computer science.
|2 fast
|0 (OCoLC)fst00888884
|
650 |
|
7 |
|a Malware (Computer software)
|2 fast
|0 (OCoLC)fst01748230
|
650 |
|
7 |
|a Malware
|2 gnd
|
650 |
|
7 |
|a Computervirus
|2 gnd
|
650 |
|
7 |
|a Debugging
|2 gnd
|
650 |
|
7 |
|a Computersicherheit
|2 gnd
|
700 |
1 |
|
|a Honig, Andrew.
|
776 |
0 |
8 |
|i Print version:
|a Sikorski, Michael.
|t Practical malware analysis.
|d San Francisco : No Starch Press, 2012
|w (DLC) 2012000214
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781593272906/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33086818
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10574799
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1390367
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10349927
|
994 |
|
|
|a 92
|b IZTAP
|