MARC보기
LDR05353cmm u2200577Ii 4500
001000000317297
003OCoLC
00520230525182307
006m d
007cr cnu---unuuu
008191005s2019 enk o 001 0 eng d
015 ▼a GBB9G5323 ▼2 bnb
0167 ▼a 019559727 ▼2 Uk
020 ▼a 1789809495
020 ▼a 9781789809497 ▼q (electronic bk.)
020 ▼z 9781789807608 (pbk.)
035 ▼a 2255806 ▼b (N$T)
035 ▼a (OCoLC)1121138878
037 ▼a 9781789809497 ▼b Packt Publishing
040 ▼a EBLCP ▼b eng ▼c EBLCP ▼d UKMGB ▼d OCLCO ▼d EBLCP ▼d OCLCQ ▼d N$T ▼d OCLCO ▼d 248032
049 ▼a MAIN
050 4 ▼a QA76.774.L46
08204 ▼a 005.432 ▼2 23
1001 ▼a Born, Michael, ▼e author.
24510 ▼a Binary analysis cookbook ▼h [electronic resource] : ▼b actionable recipes for disassembling and analyzing binaries for security risks / ▼c Michael Born.
260 ▼a Birmingham, UK : ▼b Packt Publishing Ltd., ▼c 2019.
300 ▼a 1 online resource (388 p.)
336 ▼a text ▼2 rdacontent
337 ▼a computer ▼2 rdamedia
338 ▼a online resource ▼2 rdacarrier
500 ▼a Includes index.
500 ▼a Getting ready.
500 ▼a Description based upon print version of record.
5050 ▼a Cover; Title Page; Copyright and Credits; Dedication; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Setting Up the Lab; Installing VirtualBox on Windows; Getting ready; How to do it...; How it works...; There's more...; See also; Installing VirtualBox on Mac; Getting ready; How to do it...; How it works...; There's more...; See also; Installing VirtualBox on Ubuntu; Getting ready; How to do it...; How it works...; There's more...; See also; Installing a 32-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it...; How it works...; There's more...
5058 ▼a See alsoInstalling a 64-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the dependencies and the tools; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the code examples; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the EDB Debugger; Getting ready; How to do it...; How it works...; There's more...; See also; Taking a snapshot of the virtual machines; Getting ready; How to do it...; How it works...; There's more...; See also
5058 ▼a Chapter 2: 32-bit Assembly on Linux and the ELF SpecificationTechnical requirements; Differences between Intel and AT&T syntax; Getting ready; How to do it...; How it works...; There's more...; See also; Introduction to the IA-32 registers; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing common IA-32 instructions; Getting ready; How to do it...; How it works...; There's more...; See also; Making IA-32 system calls on Linux; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing the ELF 32-bit specification; Getting ready
5058 ▼a How to do it...How it works...; There's more...; See also; Chapter 3: 64-bit Assembly on Linux and the ELF Specification; Technical requirements; Introducing the IA64 registers; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing common IA64 instructions; Getting ready; How to do it...; How it works...; There's more...; See also; Making IA64 system calls on Linux; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing the ELF 64-bit specification; Getting ready; How to do it...; How it works...; There's more...; See also
5058 ▼a Chapter 4: Creating a Binary Analysis MethodologyTechnical requirements; Performing binary discovery; Getting ready; How to do it...; How it works...; There's more...; See also; Information gathering; Getting ready; How to do it...; How it works...; There's more...; See also; Static analysis; Getting ready; How to do it...; How it works...; There's more...; See also; Dynamic analysis; Getting ready; How to do it...; How it works...; There's more...; See also; Iterating each step; Getting ready; How to do it...; How it works...; There's more...; See also; Automating methodology tasks
520 ▼a Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering.
590 ▼a Master record variable field(s) change: 050
63000 ▼a Linux.
650 0 ▼a Operating systems (Computers)
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Open source software.
650 0 ▼a Software engineering.
655 4 ▼a Electronic books.
77608 ▼i Print version: ▼a Born, Michael ▼t Binary Analysis Cookbook : Actionable Recipes for Disassembling and Analyzing Binaries for Security Risks ▼d Birmingham : Packt Publishing, Limited,c2019 ▼z 9781789807608
85640 ▼3 EBSCOhost ▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2255806
938 ▼a ProQuest Ebook Central ▼b EBLB ▼n EBL5904525
938 ▼a EBSCOhost ▼b EBSC ▼n 2255806
990 ▼a 관리자
994 ▼a 92 ▼b N$T