MARC 닫기
05353cam a2200577Ii 4500
000001334180
20210114163043
m d
cr cnu---unuuu
191005s2019 enk o 001 0 eng d
▼a GBB9G5323
▼2 bnb
▼a 019559727
▼2 Uk
▼a 1789809495
▼a 9781789809497
▼q (electronic bk.)
▼z 9781789807608 (pbk.)
▼a 2255806
▼b (N$T)
▼a (OCoLC)1121138878
▼a 9781789809497
▼b Packt Publishing
▼a EBLCP
▼b eng
▼c EBLCP
▼d UKMGB
▼d OCLCO
▼d EBLCP
▼d OCLCQ
▼d N$T
▼d OCLCO
▼d 248023
▼a QA76.774.L46
▼a 005.432
▼2 23
▼a Born, Michael,
▼e author.
▼a Binary analysis cookbook
▼h [electronic resource]:
▼b actionable recipes for disassembling and analyzing binaries for security risks /:
▼c Michael Born.
▼a Birmingham, UK:
▼b Packt Publishing Ltd.,
▼c 2019.
▼a 1 online resource (388 p.).
▼a text
▼2 rdacontent
▼a computer
▼2 rdamedia
▼a online resource
▼2 rdacarrier
▼a Includes index.
▼a Getting ready.
▼a Description based upon print version of record.
▼a Cover; Title Page; Copyright and Credits; Dedication; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Setting Up the Lab; Installing VirtualBox on Windows; Getting ready; How to do it...; How it works...; There's more...; See also; Installing VirtualBox on Mac; Getting ready; How to do it...; How it works...; There's more...; See also; Installing VirtualBox on Ubuntu; Getting ready; How to do it...; How it works...; There's more...; See also; Installing a 32-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it...; How it works...; There's more...
▼a See alsoInstalling a 64-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the dependencies and the tools; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the code examples; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the EDB Debugger; Getting ready; How to do it...; How it works...; There's more...; See also; Taking a snapshot of the virtual machines; Getting ready; How to do it...; How it works...; There's more...; See also
▼a Chapter 2: 32-bit Assembly on Linux and the ELF SpecificationTechnical requirements; Differences between Intel and AT&T syntax; Getting ready; How to do it...; How it works...; There's more...; See also; Introduction to the IA-32 registers; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing common IA-32 instructions; Getting ready; How to do it...; How it works...; There's more...; See also; Making IA-32 system calls on Linux; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing the ELF 32-bit specification; Getting ready
▼a How to do it...How it works...; There's more...; See also; Chapter 3: 64-bit Assembly on Linux and the ELF Specification; Technical requirements; Introducing the IA64 registers; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing common IA64 instructions; Getting ready; How to do it...; How it works...; There's more...; See also; Making IA64 system calls on Linux; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing the ELF 64-bit specification; Getting ready; How to do it...; How it works...; There's more...; See also
▼a Chapter 4: Creating a Binary Analysis MethodologyTechnical requirements; Performing binary discovery; Getting ready; How to do it...; How it works...; There's more...; See also; Information gathering; Getting ready; How to do it...; How it works...; There's more...; See also; Static analysis; Getting ready; How to do it...; How it works...; There's more...; See also; Dynamic analysis; Getting ready; How to do it...; How it works...; There's more...; See also; Iterating each step; Getting ready; How to do it...; How it works...; There's more...; See also; Automating methodology tasks
▼a Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering.
▼a Master record variable field(s) change: 050
▼a Linux.
▼a Operating systems (Computers)
▼a Computer networks
▼x Security measures.
▼a Open source software.
▼a Software engineering.
▼a Electronic books.
▼i Print version:
▼a Born, Michael
▼t Binary Analysis Cookbook : Actionable Recipes for Disassembling and Analyzing Binaries for Security Risks.
▼d Birmingham : Packt Publishing, Limited,c2019,
▼z 9781789807608
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2255806
▼a ProQuest Ebook Central
▼b EBLB
▼n EBL5904525
▼a EBSCOhost
▼b EBSC
▼n 2255806
▼a 강리원
▼a eBook
▼a 92
▼b N$T
| 자료유형 : | eBook |
|---|---|
| ISBN : | 1789809495 |
| ISBN : | 9781789809497 |
| ISBN : | |
| 개인저자 : | Born, Michael, author. |
| 서명/저자사항 : | Binary analysis cookbook [electronic resource]: actionable recipes for disassembling and analyzing binaries for security risks /: Michael Born. |
| 발행사항 : | Birmingham, UK: Packt Publishing Ltd., 2019. |
| 형태사항 : | 1 online resource (388 p.). |
| 일반주기 : | Includes index. |
| 일반주기 : | Getting ready. |
| 일반주기 : | Description based upon print version of record. |
| 내용주기 : | Cover; Title Page; Copyright and Credits; Dedication; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Setting Up the Lab; Installing VirtualBox on Windows; Getting ready; How to do it...; How it works...; There's more...; See also; Installing VirtualBox on Mac; Getting ready; How to do it...; How it works...; There's more...; See also; Installing VirtualBox on Ubuntu; Getting ready; How to do it...; How it works...; There's more...; See also; Installing a 32-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it...; How it works...; There's more... |
| 내용주기 : | See alsoInstalling a 64-bit Ubuntu 16.04 LTS Desktop virtual machine; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the dependencies and the tools; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the code examples; Getting ready; How to do it...; How it works...; There's more...; See also; Installing the EDB Debugger; Getting ready; How to do it...; How it works...; There's more...; See also; Taking a snapshot of the virtual machines; Getting ready; How to do it...; How it works...; There's more...; See also |
| 내용주기 : | Chapter 2: 32-bit Assembly on Linux and the ELF SpecificationTechnical requirements; Differences between Intel and AT&T syntax; Getting ready; How to do it...; How it works...; There's more...; See also; Introduction to the IA-32 registers; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing common IA-32 instructions; Getting ready; How to do it...; How it works...; There's more...; See also; Making IA-32 system calls on Linux; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing the ELF 32-bit specification; Getting ready |
| 내용주기 : | How to do it...How it works...; There's more...; See also; Chapter 3: 64-bit Assembly on Linux and the ELF Specification; Technical requirements; Introducing the IA64 registers; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing common IA64 instructions; Getting ready; How to do it...; How it works...; There's more...; See also; Making IA64 system calls on Linux; Getting ready; How to do it...; How it works...; There's more...; See also; Introducing the ELF 64-bit specification; Getting ready; How to do it...; How it works...; There's more...; See also |
| 내용주기 : | Chapter 4: Creating a Binary Analysis MethodologyTechnical requirements; Performing binary discovery; Getting ready; How to do it...; How it works...; There's more...; See also; Information gathering; Getting ready; How to do it...; How it works...; There's more...; See also; Static analysis; Getting ready; How to do it...; How it works...; There's more...; See also; Dynamic analysis; Getting ready; How to do it...; How it works...; There's more...; See also; Iterating each step; Getting ready; How to do it...; How it works...; There's more...; See also; Automating methodology tasks |
| 요약 : | Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering. |
| 주제명(통일서명) : | Linux. -- |
| 일반주제명 : | Operating systems (Computers) -- |
| 일반주제명 : | Computer networks -- Security measures. -- |
| 일반주제명 : | Open source software. -- |
| 일반주제명 : | Software engineering. -- |
| 기타형태 저록 : | Print version: Born, Michael Binary Analysis Cookbook : Actionable Recipes for Disassembling and Analyzing Binaries for Security Risks. Birmingham : Packt Publishing, Limited,c2019, 9781789807608 |
| 언어 | 영어 |
| URL : |
|---|
서평쓰기