Coverart for item
The Resource Identifying malicious code through reverse engineering, edited by Abhishek Singh

Identifying malicious code through reverse engineering, edited by Abhishek Singh

Label
Identifying malicious code through reverse engineering
Title
Identifying malicious code through reverse engineering
Statement of responsibility
edited by Abhishek Singh
Contributor
Subject
Language
eng
Summary
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. This title provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. It includes fresh exploits through various case studies
Member of
Cataloging source
GW5XE
Dewey number
005.8/4
Illustrations
illustrations
Index
no index present
Language note
English
LC call number
QA76.76.C68
LC item number
I34 2009
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
1976-
http://library.link/vocab/relatedWorkOrContributorName
Singh, Abhishek
Series statement
Advances in information security
Series volume
44
http://library.link/vocab/subjectName
  • Reverse engineering
  • Computer viruses
  • Software protection
  • Informatique
  • Computer viruses
  • Reverse engineering
  • Software protection
Label
Identifying malicious code through reverse engineering, edited by Abhishek Singh
Instantiates
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Preface -- Fundamentals of Assembly -- Fundamental of Windows -- Executable formats -- Reversing Binaries for Vulnerabilities -- Reversing .Net Applications -- Reversing Patches for Identification of Vulnerabilities -- Anti ReversingTechniques -- Index
Control code
318545375
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9780387098241
Lccn
2008942254
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9786612019289
  • 10.1007/978-0-387-89468-3
http://library.link/vocab/ext/overdrive/overdriveId
978-0-387-09824-1
Specific material designation
remote
System control number
(OCoLC)318545375
Label
Identifying malicious code through reverse engineering, edited by Abhishek Singh
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Preface -- Fundamentals of Assembly -- Fundamental of Windows -- Executable formats -- Reversing Binaries for Vulnerabilities -- Reversing .Net Applications -- Reversing Patches for Identification of Vulnerabilities -- Anti ReversingTechniques -- Index
Control code
318545375
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9780387098241
Lccn
2008942254
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9786612019289
  • 10.1007/978-0-387-89468-3
http://library.link/vocab/ext/overdrive/overdriveId
978-0-387-09824-1
Specific material designation
remote
System control number
(OCoLC)318545375

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...