Practical reverse engineering : (Record no. 8494)

MARC details
000 -LEADER
fixed length control field 01901cam a2200361 a 4500
CONTROL NUMBER
control field 11040650
DATE AND TIME OF LATEST TRANSACTION
control field 20150929123415.0
FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr zn|
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 141016s2014 inua ob 001 0 eng d
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118787311
SYSTEM CONTROL NUMBER
System control number (CtWfDGI)bks00062680
SYSTEM CONTROL NUMBER
System control number (NNC)11040650
CATALOGING SOURCE
Original cataloging agency CtWfDGI
Language of cataloging eng
Transcribing agency CtWfDGI
LIBRARY OF CONGRESS CALL NUMBER
Classification number TA168.5
Item number .D36 2014eb
DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number DAN
MAIN ENTRY--PERSONAL NAME
Personal name Dang, Bruce.
TITLE STATEMENT
Title Practical reverse engineering :
Remainder of title x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation /
Statement of responsibility, etc Bruce Dang, Alexandre Gazet, Elias Bachaalany ; with contributions from Sébastien Josse
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Indianapolis, IN :
Name of publisher, distributor, etc John Wiley & Sons,
Date of publication, distribution, etc c2014
Place of manufacture (Norwood, Mass. :
Manufacturer Books24x7.com [generator])
PHYSICAL DESCRIPTION
Extent xxvi, 355 p.
BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
TYPE OF COMPUTER FILE OR DATA NOTE
Type of computer file or data note Text.
SUMMARY, ETC.
Summary, etc This book discusses reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. It covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques. The book offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples; explains how to analyze drivers step by step; demystifies topics that have a steep learning curve; and includes a bonus chapter on reverse engineering tools. --
ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Available also in a print ed.
SYSTEM DETAILS NOTE
System details note Mode of access: Internet via World Wide Web.
ISSUING BODY NOTE
Issuing body note Digitized and made available by: Books24x7.com.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Reverse engineering.
INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
ADDED ENTRY--PERSONAL NAME
Personal name Gazet, Alexandre.
Relator code author.
ADDED ENTRY--PERSONAL NAME
Personal name Bachaalany, Elias.
Relator code author.
ADDED ENTRY--PERSONAL NAME
Personal name Josse, Sébastien.
Relator code contributor.
ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date last borrowed Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     Learning Resource Centre Learning Resource Centre 23/09/2015 82 2398.59 2 005.8 DAN 9261 12/09/2022 08/09/2022 3426.57 23/09/2015 Books
Powered by Koha & maintained by LRC, JK Lakshmipat University, Jaipur
Contact: [email protected]
Copyright © 2022 LRC, JK Lakshmipat University, Jaipur. All Rights Reserved.