LDR | | 05353cmm u2200577Ii 4500 |
001 | | 000000317297 |
003 | | OCoLC |
005 | | 20230525182307 |
006 | | m d |
007 | | cr cnu---unuuu |
008 | | 191005s2019 enk o 001 0 eng d |
015 | |
▼a GBB9G5323
▼2 bnb |
016 | 7 |
▼a 019559727
▼2 Uk |
020 | |
▼a 1789809495 |
020 | |
▼a 9781789809497
▼q (electronic bk.) |
020 | |
▼z 9781789807608 (pbk.) |
035 | |
▼a 2255806
▼b (N$T) |
035 | |
▼a (OCoLC)1121138878 |
037 | |
▼a 9781789809497
▼b Packt Publishing |
040 | |
▼a EBLCP
▼b eng
▼c EBLCP
▼d UKMGB
▼d OCLCO
▼d EBLCP
▼d OCLCQ
▼d N$T
▼d OCLCO
▼d 248032 |
049 | |
▼a MAIN |
050 | 4 |
▼a QA76.774.L46 |
082 | 04 |
▼a 005.432
▼2 23 |
100 | 1 |
▼a Born, Michael,
▼e author. |
245 | 10 |
▼a Binary analysis cookbook
▼h [electronic resource] :
▼b actionable recipes for disassembling and analyzing binaries for security risks /
▼c Michael Born. |
260 | |
▼a Birmingham, UK :
▼b Packt Publishing Ltd.,
▼c 2019. |
300 | |
▼a 1 online resource (388 p.) |
336 | |
▼a text
▼2 rdacontent |
337 | |
▼a computer
▼2 rdamedia |
338 | |
▼a online resource
▼2 rdacarrier |
500 | |
▼a Includes index. |
500 | |
▼a Getting ready. |
500 | |
▼a Description based upon print version of record. |
505 | 0 |
▼a Cover; Title Page; Copyright and Credits; Dedication; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Setting Up the Lab; Installing VirtualBox on Windows; Getting ready; How to do it...; How it works...; There's more...; See also; Installing VirtualBox on Mac; Getting ready; How to do it...; How it works...; There's more...; See also; Installing VirtualBox on Ubuntu; Getting ready; How to do it...; How it works...; There's more...; See also; Installing a 32-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it...; How it works...; There's more... |
505 | 8 |
▼a See alsoInstalling a 64-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the dependencies and the tools; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the code examples; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the EDB Debugger; Getting ready; How to do it...; How it works...; There's more...; See also; Taking a snapshot of the virtual machines; Getting ready; How to do it...; How it works...; There's more...; See also |
505 | 8 |
▼a Chapter 2: 32-bit Assembly on Linux and the ELF SpecificationTechnical requirements; Differences between Intel and AT&T syntax; Getting ready; How to do it...; How it works...; There's more...; See also; Introduction to the IA-32 registers; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing common IA-32 instructions; Getting ready; How to do it...; How it works...; There's more...; See also; Making IA-32 system calls on Linux; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing the ELF 32-bit specification; Getting ready |
505 | 8 |
▼a How to do it...How it works...; There's more...; See also; Chapter 3: 64-bit Assembly on Linux and the ELF Specification; Technical requirements; Introducing the IA64 registers; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing common IA64 instructions; Getting ready; How to do it...; How it works...; There's more...; See also; Making IA64 system calls on Linux; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing the ELF 64-bit specification; Getting ready; How to do it...; How it works...; There's more...; See also |
505 | 8 |
▼a Chapter 4: Creating a Binary Analysis MethodologyTechnical requirements; Performing binary discovery; Getting ready; How to do it...; How it works...; There's more...; See also; Information gathering; Getting ready; How to do it...; How it works...; There's more...; See also; Static analysis; Getting ready; How to do it...; How it works...; There's more...; See also; Dynamic analysis; Getting ready; How to do it...; How it works...; There's more...; See also; Iterating each step; Getting ready; How to do it...; How it works...; There's more...; See also; Automating methodology tasks |
520 | |
▼a Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering. |
590 | |
▼a Master record variable field(s) change: 050 |
630 | 00 |
▼a Linux. |
650 | 0 |
▼a Operating systems (Computers) |
650 | 0 |
▼a Computer networks
▼x Security measures. |
650 | 0 |
▼a Open source software. |
650 | 0 |
▼a Software engineering. |
655 | 4 |
▼a Electronic books. |
776 | 08 |
▼i Print version:
▼a Born, Michael
▼t Binary Analysis Cookbook : Actionable Recipes for Disassembling and Analyzing Binaries for Security Risks
▼d Birmingham : Packt Publishing, Limited,c2019
▼z 9781789807608 |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2255806 |
938 | |
▼a ProQuest Ebook Central
▼b EBLB
▼n EBL5904525 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 2255806 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b N$T |