000 01923nam a22003014a 4500
001 UCACUE
005 20231227100403.0
007 ta
008 2023 t2012 us gr 00| 0 eng d
020 _a978-1-59327-290-6
040 _aUCACUE
041 _aeng
043 _cUSA
082 _a005.8
_bSI579p
100 _aSikorski, Michael
_eautor
245 _aPractical malware analysis:
_bthe hands on guide to dissecting malicious software
250 _a1a. Edición
260 _aSan Francisco,
_bNo Starch Press;
_c2012
300 _a766 páginas
_bilustraciones; gráficos; tablas;
_c23x18 cm
500 _aincluye índice de contenido
505 _a"Basic Analysis.-Part 1: Basic Analysis.-Chapter 1: Basic Static Techniques.-Chapter 2: Malware Analysis in Virtual Machines.-Chapter 3: Basic Dynamic Analysis.-Part 2: Advanced Static Analysis Chapter 4: A Crash Course in x86 Disassembly.-Chapter 5: IDA Pro.- Chapter 6: Recognizing C Code Constructs in Assembly.- Chapter 7: Analyzing Malicious Windows Programs.- Part 3: Advanced Dynamic Analysis.-hapter 8: Debugging.-Chapter 9: OllyDbg.-Chapter 10: Kernel Debugging with WinDbg.- Part 4: Malware Functionality.-Chapter 11: Malware Behavior.-Chapter 12: Covert Malware Launching Chapter 13: Data Encoding.-Chapter 14: Malware-Focused Network Signatures.-Part 5: Anti-Reverse-Engineering.-Chapter 15: Anti-Disassembly.- Chapter 16: Anti-Debugging.-Chapter 17: Anti-Virtual Machine Techniques.-Chapter 18: Packers and Unpacking.-Part 6: Special Topics.-Chapter 19: Shellcode Analysis.-Chapter 20: C++ Analysis.-Chapter 21: 64-Bit Malware.-Appendix A: Important Windows Functions.-Appendix B: Tools for Malware Analysis.-Appendix C: Solutions to Labs."
653 _aAnalysis
653 _amalware
653 _aprograms
653 _amachines
700 _aHoging, Andrew
_eautor
_960643
942 _cBK
_e2023-12-27
_zDaniel Osorio
999 _c112731
_d112731