CHF 133.00

Identifying Malicious Code Through Reverse Engineering

Inglese · Copertina rigida

Spedizione di solito entro 3 a 5 settimane

Questo articolo non può essere restituito.

Descrizione

Ulteriori informazioni

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.
Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies.
Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.

Riassunto

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.


Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies.


Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.

Dettagli sul prodotto

Con la collaborazione di Abhishek Singh (Editore), Abhishe Singh (Editore)
Autori Abhishek Singh, Baibhav Singh
Editore Springer, Berlin
 
Contenuto Libro
Forma del prodotto Copertina rigida
Data pubblicazione 23.02.2011
Categoria Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica
 
EAN 9780387098241
ISBN 978-0-387-09824-1
Numero di pagine 188
Illustrazioni X, 188 p. 20 illus.
Dimensioni (della confezione) 15.5 x 23.5 cm
 
Serie Advances in Information Security > 44
Advances in Information Securi > 58
Advances in Information Security > 44
Advances in Information Securi > 44
Advances in Cyber Security
Categorie B, Nachrichtententechnik, Telekommunikation, Algorithmen und Datenstrukturen, Netzwerksicherheit, angewandte informatik, COMPUTERS / Computer Science, COMPUTERS / Information Theory, Netzwerk-Hardware, Kryptografie, Verschlüsselungstechnologie, COMPUTERS / Databases / General, COMPUTERS / Security / General, COMPUTERS / Information Technology, COMPUTERS / Enterprise Applications / General, COMPUTERS / Networking / Hardware, COMPUTERS / Security / Networking, Computers - Communications / Networking, computer science, Information Retrieval, Electrical Engineering, Information Systems Applications (incl. Internet), Information Systems Applications (incl.Internet), Systems and Data Security, Data and Information Security, Data Structures and Information Theory, Application software, Computer Communication Networks, Communications Engineering, Networks, Algorithms & data structures, Network Security, Computer security, Information theory, Coding theory & cryptology, Internet searching, Communications engineering / telecommunications, Data structures (Computer science), Data encryption, Data encryption (Computer science), Cryptology, Computer communication systems, Network hardware
 

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.