Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Identifying Malicious Code Through Reverse Engineering -

Identifying Malicious Code Through Reverse Engineering

Abhishek Singh (Herausgeber)

Buch | Softcover
2008
Springer-Verlag New York Inc.
978-0-387-89467-6 (ISBN)
Preis auf Anfrage
  • Keine Verlagsinformationen verfügbar
  • Artikel merken
Attacks take place with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. This book provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software.
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. "Identifying Malicious Code Through Reverse Engineering" provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies. "Identifying Malicious Code Through Reverse Engineering" is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.

Preface.- Fundamentals of Assembly.- Fundamental of Windows.- Executable formats.- Reversing Binaries for Vulnerabilities.- Reversing .Net Applications.- Reversing Patches for Identification of Vulnerabilities.- Anti ReversingTechniques.- Index.

Reihe/Serie Advances in Information Security ; v. 44
Verlagsort New York, NY
Sprache englisch
Einbandart Paperback
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
Technik Nachrichtentechnik
ISBN-10 0-387-89467-5 / 0387894675
ISBN-13 978-0-387-89467-6 / 9780387894676
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20