MARC details
000 -LEADER |
fixed length control field |
01901cam a2200361 a 4500 |
CONTROL NUMBER |
control field |
11040650 |
DATE AND TIME OF LATEST TRANSACTION |
control field |
20150929123415.0 |
FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
fixed length control field |
m o d |
PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr zn| |
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
141016s2014 inua ob 001 0 eng d |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781118787311 |
SYSTEM CONTROL NUMBER |
System control number |
(CtWfDGI)bks00062680 |
SYSTEM CONTROL NUMBER |
System control number |
(NNC)11040650 |
CATALOGING SOURCE |
Original cataloging agency |
CtWfDGI |
Language of cataloging |
eng |
Transcribing agency |
CtWfDGI |
LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TA168.5 |
Item number |
.D36 2014eb |
DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
DAN |
MAIN ENTRY--PERSONAL NAME |
Personal name |
Dang, Bruce. |
TITLE STATEMENT |
Title |
Practical reverse engineering : |
Remainder of title |
x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation / |
Statement of responsibility, etc |
Bruce Dang, Alexandre Gazet, Elias Bachaalany ; with contributions from Sébastien Josse |
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Indianapolis, IN : |
Name of publisher, distributor, etc |
John Wiley & Sons, |
Date of publication, distribution, etc |
c2014 |
Place of manufacture |
(Norwood, Mass. : |
Manufacturer |
Books24x7.com [generator]) |
PHYSICAL DESCRIPTION |
Extent |
xxvi, 355 p. |
BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
TYPE OF COMPUTER FILE OR DATA NOTE |
Type of computer file or data note |
Text. |
SUMMARY, ETC. |
Summary, etc |
This book discusses reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. It covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques. The book offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples; explains how to analyze drivers step by step; demystifies topics that have a steep learning curve; and includes a bonus chapter on reverse engineering tools. -- |
ADDITIONAL PHYSICAL FORM AVAILABLE NOTE |
Additional physical form available note |
Available also in a print ed. |
SYSTEM DETAILS NOTE |
System details note |
Mode of access: Internet via World Wide Web. |
ISSUING BODY NOTE |
Issuing body note |
Digitized and made available by: Books24x7.com. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Reverse engineering. |
INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Gazet, Alexandre. |
Relator code |
author. |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Bachaalany, Elias. |
Relator code |
author. |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Josse, Sébastien. |
Relator code |
contributor. |
ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Item type |
Books |