000 02553nam a22003615i 4500
001 280550
003 MX-SnUAN
005 20160429154028.0
007 cr nn 008mamaa
008 150903s2009 xxu| o |||| 0|eng d
020 _a9780387894683
_99780387894683
024 7 _a10.1007/9780387894683
_2doi
035 _avtls000333295
039 9 _a201509030801
_bVLOAD
_c201404130411
_dVLOAD
_c201404092200
_dVLOAD
_y201402041107
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
100 1 _aSingh, Abhishek.
_eeditor.
_9303454
245 1 0 _aIdentifying Malicious Code Through Reverse Engineering /
_cedited by Abhishek Singh.
264 1 _aBoston, MA :
_bSpringer US,
_c2009.
300 _brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aAdvances in Information Security,
_x1568-2633 ;
_v44
500 _aSpringer eBooks
505 0 _aAssembly Language -- Fundamental of Windows -- Portable Executable File Format -- Reversing Binaries for Identification of Vulnerabilities -- Fundamental of Reverse Engineering.
520 _aAttacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies. Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9780387098241
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-0-387-89468-3
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c280550
_d280550