The Resource Identifying malicious code through reverse engineering, edited by Abhishek Singh
Identifying malicious code through reverse engineering, edited by Abhishek Singh
Resource Information
The item Identifying malicious code through reverse engineering, edited by Abhishek Singh represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Identifying malicious code through reverse engineering, edited by Abhishek Singh represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. This title provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. It includes fresh exploits through various case studies
- Language
- eng
- Extent
- 1 online resource.
- Contents
-
- Preface
- Fundamentals of Assembly
- Fundamental of Windows
- Executable formats
- Reversing Binaries for Vulnerabilities
- Reversing .Net Applications
- Reversing Patches for Identification of Vulnerabilities
- Anti ReversingTechniques
- Index
- Isbn
- 9780387098241
- Label
- Identifying malicious code through reverse engineering
- Title
- Identifying malicious code through reverse engineering
- Statement of responsibility
- edited by Abhishek Singh
- Language
- eng
- Summary
- Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. This title provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. It includes fresh exploits through various case studies
- Cataloging source
- GW5XE
- Dewey number
- 005.8/4
- Illustrations
- illustrations
- Index
- no index present
- Language note
- English
- LC call number
- QA76.76.C68
- LC item number
- I34 2009
- Literary form
- non fiction
- Nature of contents
- dictionaries
- http://library.link/vocab/relatedWorkOrContributorDate
- 1976-
- http://library.link/vocab/relatedWorkOrContributorName
- Singh, Abhishek
- Series statement
- Advances in information security
- Series volume
- 44
- http://library.link/vocab/subjectName
-
- Reverse engineering
- Computer viruses
- Software protection
- Informatique
- Computer viruses
- Reverse engineering
- Software protection
- Label
- Identifying malicious code through reverse engineering, edited by Abhishek Singh
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Preface -- Fundamentals of Assembly -- Fundamental of Windows -- Executable formats -- Reversing Binaries for Vulnerabilities -- Reversing .Net Applications -- Reversing Patches for Identification of Vulnerabilities -- Anti ReversingTechniques -- Index
- Control code
- 318545375
- Dimensions
- unknown
- Extent
- 1 online resource.
- Form of item
- online
- Isbn
- 9780387098241
- Lccn
- 2008942254
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 9786612019289
- 10.1007/978-0-387-89468-3
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-0-387-09824-1
- Specific material designation
- remote
- System control number
- (OCoLC)318545375
- Label
- Identifying malicious code through reverse engineering, edited by Abhishek Singh
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Preface -- Fundamentals of Assembly -- Fundamental of Windows -- Executable formats -- Reversing Binaries for Vulnerabilities -- Reversing .Net Applications -- Reversing Patches for Identification of Vulnerabilities -- Anti ReversingTechniques -- Index
- Control code
- 318545375
- Dimensions
- unknown
- Extent
- 1 online resource.
- Form of item
- online
- Isbn
- 9780387098241
- Lccn
- 2008942254
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 9786612019289
- 10.1007/978-0-387-89468-3
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-0-387-09824-1
- Specific material designation
- remote
- System control number
- (OCoLC)318545375
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Identifying-malicious-code-through-reverse/00CWUtZkZHI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Identifying-malicious-code-through-reverse/00CWUtZkZHI/">Identifying malicious code through reverse engineering, edited by Abhishek Singh</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Identifying malicious code through reverse engineering, edited by Abhishek Singh
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Identifying-malicious-code-through-reverse/00CWUtZkZHI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Identifying-malicious-code-through-reverse/00CWUtZkZHI/">Identifying malicious code through reverse engineering, edited by Abhishek Singh</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>