Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing Ltd.
2019
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781789807608/?ar |
Zusammenfassung: | Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering. |
Beschreibung: | Includes index. - Getting ready. - Print version record |
Umfang: | 1 online resource (388 pages) |
ISBN: | 1789809495 9781789809497 9781789807608 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048523224 | ||
003 | DE-627-1 | ||
005 | 20240228120857.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2019 xx |||||o 00| ||eng c | ||
020 | |a 1789809495 |9 1-78980-949-5 | ||
020 | |a 9781789809497 |c electronic bk. |9 978-1-78980-949-7 | ||
020 | |a 9781789807608 |9 978-1-78980-760-8 | ||
035 | |a (DE-627-1)048523224 | ||
035 | |a (DE-599)KEP048523224 | ||
035 | |a (ORHE)9781789807608 | ||
035 | |a (DE-627-1)048523224 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.432 |2 23 | |
100 | 1 | |a Born, Michael |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Binary analysis cookbook |b actionable recipes for disassembling and analyzing binaries for security risks |c Michael Born |
264 | 1 | |a Birmingham, UK |b Packt Publishing Ltd. |c 2019 | |
300 | |a 1 online resource (388 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Getting ready. - Print version record | ||
520 | |a Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering. | ||
630 | 2 | 0 | |a Linux |
650 | 0 | |a Operating systems (Computers) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Open source software | |
650 | 0 | |a Software engineering | |
650 | 4 | |a Linux | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Logiciels libres | |
650 | 4 | |a Génie logiciel | |
650 | 4 | |a operating systems | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Open source software | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Software engineering | |
776 | 1 | |z 9781789807608 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781789807608 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781789807608/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-048523224 |
---|---|
_version_ | 1833357060264165376 |
adam_text | |
any_adam_object | |
author | Born, Michael |
author_facet | Born, Michael |
author_role | aut |
author_sort | Born, Michael |
author_variant | m b mb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048523224 (DE-599)KEP048523224 (ORHE)9781789807608 |
dewey-full | 005.432 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.432 |
dewey-search | 005.432 |
dewey-sort | 15.432 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02313cam a22005652c 4500</leader><controlfield tag="001">ZDB-30-ORH-048523224</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120857.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1789809495</subfield><subfield code="9">1-78980-949-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789809497</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78980-949-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789807608</subfield><subfield code="9">978-1-78980-760-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048523224</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048523224</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781789807608</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048523224</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.432</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Born, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Binary analysis cookbook</subfield><subfield code="b">actionable recipes for disassembling and analyzing binaries for security risks</subfield><subfield code="c">Michael Born</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing Ltd.</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (388 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Getting ready. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels libres</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Génie logiciel</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781789807608</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781789807608</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781789807608/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048523224 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:45:41Z |
institution | BVB |
isbn | 1789809495 9781789809497 9781789807608 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (388 pages) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing Ltd. |
record_format | marc |
spelling | Born, Michael VerfasserIn aut Binary analysis cookbook actionable recipes for disassembling and analyzing binaries for security risks Michael Born Birmingham, UK Packt Publishing Ltd. 2019 1 online resource (388 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Getting ready. - Print version record Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering. Linux Operating systems (Computers) Computer networks Security measures Open source software Software engineering Systèmes d'exploitation (Ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels libres Génie logiciel operating systems Computer networks ; Security measures 9781789807608 Erscheint auch als Druck-Ausgabe 9781789807608 |
spellingShingle | Born, Michael Binary analysis cookbook actionable recipes for disassembling and analyzing binaries for security risks Linux Operating systems (Computers) Computer networks Security measures Open source software Software engineering Systèmes d'exploitation (Ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels libres Génie logiciel operating systems Computer networks ; Security measures |
title | Binary analysis cookbook actionable recipes for disassembling and analyzing binaries for security risks |
title_auth | Binary analysis cookbook actionable recipes for disassembling and analyzing binaries for security risks |
title_exact_search | Binary analysis cookbook actionable recipes for disassembling and analyzing binaries for security risks |
title_full | Binary analysis cookbook actionable recipes for disassembling and analyzing binaries for security risks Michael Born |
title_fullStr | Binary analysis cookbook actionable recipes for disassembling and analyzing binaries for security risks Michael Born |
title_full_unstemmed | Binary analysis cookbook actionable recipes for disassembling and analyzing binaries for security risks Michael Born |
title_short | Binary analysis cookbook |
title_sort | binary analysis cookbook actionable recipes for disassembling and analyzing binaries for security risks |
title_sub | actionable recipes for disassembling and analyzing binaries for security risks |
topic | Linux Operating systems (Computers) Computer networks Security measures Open source software Software engineering Systèmes d'exploitation (Ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels libres Génie logiciel operating systems Computer networks ; Security measures |
topic_facet | Linux Operating systems (Computers) Computer networks Security measures Open source software Software engineering Systèmes d'exploitation (Ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels libres Génie logiciel operating systems Computer networks ; Security measures |
work_keys_str_mv | AT bornmichael binaryanalysiscookbookactionablerecipesfordisassemblingandanalyzingbinariesforsecurityrisks |