Practical malware analysis : the hands-on guide to dissecting malicious software / Michael Sikorski and Andrew Honig.
Tipo de material: TextoIdioma: Inglés Detalles de publicación: San Francisco, California : no starch press, 2012.Descripción: xxxi, 766 páginas : gráfica, tablas ; 24 cmISBN:- 9781593272906
- QA 76 .76 .C68 .S55 2012
Tipo de ítem | Biblioteca actual | Signatura | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|
Monografía - Colección General | SUCURSAL JUAN PABLO DUARTE Area Administrativa | QA 76 .76 .C68. S55 2012 (Navegar estantería(Abre debajo)) | Disponible | 1051204 |
Navegando Biblioteca «Juan Pablo Duarte» estanterías, Ubicación en estantería: Area Administrativa Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
QA 76. 73 .S67 .B45 2016 T-SQL fundamentals / | QA 76 .758 .E34 2005 Reversing : secrets of reverse engineering / | QA 76 .76 .A65 .K612 2017 Designing data-intensive applications : the big ideas behind reliable, scalable, and maintainable systems / | QA 76 .76 .C68. S55 2012 Practical malware analysis : the hands-on guide to dissecting malicious software / | QA 76 .76 .D47 .S56 2012 Scrum : a breathtakingly brief and agile introduction / | QA 76. 76 .D57 .D35 2014 Practical reverse engineering : x86, x64, ARM, windows Kernel, reversing tools, and obfuscation / | QA 76 .76 .M52 .H54 2020 Microsoft Blazor : building applications in .NET / |
Material de apoyo Departamento de Seguridad Cibernética y de la Información.
About the authors, xix -- Foreword / by Richard Bejtlich, xxi -- Acknowledgments, xxv -- Introduction, xxvii -- Chapter 0: Malware analysis primer, 1 -- Part 1: Basic Analysis -- Chapter 1. Basic Static Techniques, 9 -- Chapter 2. Malware analysis in virtual machines, 29 -- Chapter 3. Basic dynamic analysis, 39 -- Part 2. Advanced static analysis -- Chapter 4. A Crash Course in x86 disassembly, 65 -- Chapter 5. IDA pro, 87 -- Chapter 6. Recognizing C code constructs in assembly, 109 -- Chapter 7. Analyzing malicious windows programs, 135 -- Part 3. Advanced dynamic analysis -- Chapter 8. Debugging, 167 -- Chapter 9. OllyDbg, 179 -- Chapter 10. Kernel Debugging with WinDbg, 205 -- Part 4. Malware functionality -- Chapter 11. Malware behavior, 231 -- Chapter 12. Covert Malware Launching, 253 -- Chapter 13. Data encoding, 269 -- Chapter 14. Malware-Focused network signatures, 297 -- Part 5. Anti-Reverse-engineering -- Chapter 15. Anti-disassembly, 327 -- Chapter 16. Anti-Debugging, 351 -- Chapter 17: Anti-Virtual machine techniques, 369 -- Chapter 18. Packers and Unpacking, 383 -- Part 6. Special topics -- Chapter 19. Shellcode analysis, 407 -- Chapter 20. C++ Analysis, 427 -- Chapter 21. 64-Bit Malware, 441 -- Appendix A. Important windows functions, 453 -- Appendix B. Tools for Malware Analysis, 465 -- Appendix C. Solutions to labs, 477 -- Index, 733.
No hay comentarios en este titulo.