Identifying Malicious Code Through Reverse Engineering
2008
Springer-Verlag New York Inc.
978-0-387-89467-6 (ISBN)
Springer-Verlag New York Inc.
978-0-387-89467-6 (ISBN)
- Keine Verlagsinformationen verfügbar
- Artikel merken
Attacks take place with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. This book provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software.
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. "Identifying Malicious Code Through Reverse Engineering" provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies. "Identifying Malicious Code Through Reverse Engineering" is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. "Identifying Malicious Code Through Reverse Engineering" provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies. "Identifying Malicious Code Through Reverse Engineering" is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.
Preface.- Fundamentals of Assembly.- Fundamental of Windows.- Executable formats.- Reversing Binaries for Vulnerabilities.- Reversing .Net Applications.- Reversing Patches for Identification of Vulnerabilities.- Anti ReversingTechniques.- Index.
Reihe/Serie | Advances in Information Security ; v. 44 |
---|---|
Verlagsort | New York, NY |
Sprache | englisch |
Einbandart | Paperback |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Weitere Themen ► Hardware | |
Technik ► Nachrichtentechnik | |
ISBN-10 | 0-387-89467-5 / 0387894675 |
ISBN-13 | 978-0-387-89467-6 / 9780387894676 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99 €
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
69,99 €