|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_on1129470549 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||||||| |
008 |
191204s2019 xx o 000 0 eng |
040 |
|
|
|a AU@
|b eng
|e pn
|c AU@
|d UAB
|d OCLCQ
|d OCLCO
|d UMI
|d OCLCF
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1131863272
|
020 |
|
|
|z 9781098115258
|
024 |
8 |
|
|a 9781098115265
|
029 |
0 |
|
|a AU@
|b 000066261232
|
035 |
|
|
|a (OCoLC)1129470549
|z (OCoLC)1131863272
|
037 |
|
|
|a CL0501000085
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Messier, Ric,
|e author.
|
245 |
1 |
0 |
|a Getting Started with Ghidra /
|c Messier, Ric.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b O'Reilly Media, Inc.,
|c 2019.
|
300 |
|
|
|a 1 online resource (39 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
520 |
|
|
|a There's a powerful new tool in the fight against malware. The US National Security Agency (NSA) recently released its reverse engineering framework, Ghidra, as free and open source software. This practical report explains how engineers can use Ghidra to analyze malware and determine its impact on vulnerable systems. Developers can also use this tool to get a detailed look at compiled programs. Information security experts Ric Messier and Matthew Berninger show you how Ghidra helps you to analyze compiled code on Linux, Windows, and macOS. You'll be able to visually inspect a program, follow the path of execution, and analyze the code from function call to function call. The more you work with Ghidra, the more you'll understand how effective this platform is. Get a feature overview of Ghidra, including a quick look into its origins Explore program use cases, including malware analysis, compiler comparison, and efficiency improvements Learn the advantages of running this Java-based framework in a container Perform code analysis by disassembling and graphing a program using Ghidra's CodeBrowser tool Run Ghirdra on innocuous programs before analyzing code that may be infected.
|
542 |
|
|
|f Copyright © 2019 O'Reilly Media, Inc.
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
|
|
|a Online resource; Title from title page (viewed October 25, 2019)
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Management.
|
650 |
|
0 |
|a Malware (Computer software)
|
650 |
|
0 |
|a Open source software.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Gestion.
|
650 |
|
6 |
|a Logiciels malveillants.
|
650 |
|
6 |
|a Logiciels libres.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Malware (Computer software)
|2 fast
|
650 |
|
7 |
|a Open source software
|2 fast
|
700 |
1 |
|
|a Berninger, Matt,
|e author.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098115265/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|