Detalles MARC
000 -LEADER |
fixed length control field |
01753nam a2200241 i 4500 |
001 - CONTROL NUMBER |
control field |
C00087433c |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DO-SdBDB |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230317144909.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
200221s20052005in d fr 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780764574818 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
043 ## - GEOGRAPHIC AREA CODE |
Geographic area code |
n-us-in |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76 .758 |
Item number |
.E34 2005 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Eilam, Eldad. |
245 00 - TITLE STATEMENT |
Title |
Reversing : |
Remainder of title |
secrets of reverse engineering / |
Statement of responsibility, etc. |
Eldad Eilam ; foreword by Elliot Chikofsky. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Indianapolis, Indiana : |
Name of publisher, distributor, etc. |
Wiley Publishing, |
Date of publication, distribution, etc. |
2005. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 595 páginas : |
Other physical details |
gráficas, tablas a blanco y negro ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Material de apoyo Departamento de Seguridad Cibernética de la Información. |
505 1# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Foreword, vii -- |
Title |
Acknowledgments -- |
-- |
, xi -- |
-- |
Introduction, xxiii -- |
-- |
Part I. Reversing, 101, 1 -- |
-- |
Charter 1. Fundations, 3 -- |
-- |
Chapter 2. Low-level sofware, 25 -- |
-- |
Chapter 3. Windows fundamentals, 69 -- |
-- |
Chapter 4. Reversing tools, 109 -- |
-- |
Part II. Applied reversing, 139 -- |
-- |
Chapter 5. Beyond the documentation, 141 -- |
-- |
Chapter 6. Deciphering file formats, 199 -- |
-- |
Chapter 7. Auditing program binaries, 243 -- |
-- |
Chapter 8. Reversing malware, 273 -- |
-- |
Part III. Cracking, 307 -- |
-- |
Chapter 9. Piracy and copy protection, 309 -- |
-- |
Chapter 10. Antireversing techniques, 327 -- |
-- |
Chapter 11. Breaking protections, 357 -- |
-- |
Part IV. Beyond disassembly, 421 -- |
-- |
Chapter 12. Reversing. NET, 421 -- |
-- |
Chapter 13. Decompilation, 457 -- |
-- |
Appendix A. Deciphering code structures, 479 -- |
-- |
Appendix B. Understanding compiled arithmetic, 519 -- |
-- |
Appendix C. Deciphering program data, 537 -- |
-- |
Appendix D. Citations, 561 -- |
-- |
Index, 567. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Ingeniería de programas informáticos. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Seguridad en computadores. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Monografía - Colección General |