Malware analyst's cookbook and DVD: tools and techniques for fighting malicious code
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Wiley
2011
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | DVD enth.: Evidence files, annotated videos, source code, Windows and Linux tools, over 50 original programs in Python, C/C++ and Perl |
Beschreibung: | XXVI, 716 S. Ill. 1 DVD (12 cm) |
ISBN: | 9780470613030 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV037367147 | ||
003 | DE-604 | ||
005 | 20170324 | ||
007 | t | ||
008 | 110427s2011 a||| |||| 00||| eng d | ||
020 | |a 9780470613030 |c (pbk.) : GBP 39.99 |9 978-0-470-61303-0 | ||
035 | |a (OCoLC)700413862 | ||
035 | |a (DE-599)HBZHT016590050 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-29T |a DE-703 |a DE-706 |a DE-739 |a DE-188 |a DE-M347 |a DE-Aug4 |a DE-861 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Malware analyst's cookbook and DVD |b tools and techniques for fighting malicious code |c Michael Hale Ligh ... |
264 | 1 | |a Indianapolis, Ind. |b Wiley |c 2011 | |
300 | |a XXVI, 716 S. |b Ill. |e 1 DVD (12 cm) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a DVD enth.: Evidence files, annotated videos, source code, Windows and Linux tools, over 50 original programs in Python, C/C++ and Perl | ||
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
653 | |a Malware (Computer software) | ||
653 | |a Computer security. | ||
689 | 0 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ligh, Michael Hale |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-118-00336-7 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-118-00829-4 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-118-00830-0 |
856 | 4 | |u http://www.gbv.de/dms/weimar/toc/63853092X_toc.pdf |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022520571&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-022520571 |
Datensatz im Suchindex
_version_ | 1804145646669660160 |
---|---|
adam_text | Contents
Introduction
..............................................................xv
On The Book s
DVD......................................................xxiii
Anonymizing Your Activities
..................................................1
Recipe
1-1:
Anonymous Web Browsing with Tor
....................................3
Recipe
1-2:
Wrapping Wget and Network Clients with Torsocks
.......................5
Recipe
1-3:
Multi-platform Tor-enabled
Downloader
in Python
.......................7
Recipe
1-4:
Forwarding Traffic through Open Proxies
..............................12
Recipe
1-5:
Using SSH Tunnels to Proxy Connections
..............................16
Recipe
1-6:
Privacy-enhanced Web browsing with Privoxy
..........................18
Recipe
1-7:
Anonymous Surfing with Anonymouse.org
..............................20
Recipe
1-8:
Internet Access through Cellular Networks
.............................21
Recipe
1-9:
Using VPNs with Anonymizer Universal
...............................23
Honeypots
................................................................27
Recipe
2-1:
Collecting
Malware
Samples with Nepenthes
............................29
Recipe
2-2:
Real-Time Attack Monitoring with IRC Logging
.........................32
Recipe
2-3:
Accepting Nepenthes Submissions over HTTP with Python
.................34
Recipe
2-і:
Collecting
Malwart
Samples with Dionaea
.............................37
Recipe
2-5:
Accepting Dionaea Submissions over HTTP with Python
..................40
Recipe
2-6:
Real-time Event Notification and Binary Sharing with XMPP
..............41
Recipe
2-7:
Analyzing and Replaying Attacks Logged by
Dionea
......................43
Recipe
2-8:
Passive Identification of Remote Systems with pOf.
.......................44
Recipe
2-9:
Graphing Dionaea Attack Patterns with SQLite and Gnuplot
...............46
Malware
Classification
......................................................51
Recipe
3-1:
Examining Existing ClamAV Signatures
...............................52
Recipe
3-2:
Creating a Custom ClamAV Database
.................................54
Recipe
3-3:
Converting ClamAV Signatures to
YARA
...............................59
Recipe
3-4:
Identifying Packers with
YARA
and PEiD
..............................61
Recipe
3-5:
Detecting
Malware
Capabilities with
YARA
............................63
Recipe
3-6:
File Type Identification and Hashing in Python
..........................68
Recipe
3-7:
Writing a Multiple-AV Scanner in Python
..............................70
Contents
Recipe
3-8:
Detecting Malicious
PE
Files in Python
................................75
Recipe
3-9:
Finding Similar
Malware
with ssdeep
.................................79
Recipe
3-10:
Detecting Self-modifying Code with ssdeep
............................82
Recipe
3-11:
Comparing Binaries with IDA and BinDiff
............................83
4
Sandboxes and Multi-AV Scanners
..........................................89
Recipe
4-1:
Scanning Files with VirusTotal
......................................90
Recipe
4-2:
Scanning Files withjotti
...........................................92
Recipe
4-3:
Scanning Files with NoVirusThanks
..................................93
Recipe
4-4:
Database-Enabled Multi-AV Uploader in Python
........................96
Recipe
4-5:
Analyzing
Malware
with ThreatExpert
...............................100
Recipe
4-6:
Analyzing
Malware
with CWSandhox
................................102
Recipe
4-7:
Analyzing
Malware
with Anubis
....................................104
Recipe
4-8:
Writing AutoIT Scripts for Joebox
..................................105
Recipe
4-9:
Defeating Path-dependent
Malware
with Joebox
.......................107
Recipe
4-10:
Defeating Process-dependent DLLs with Joebox
....................... 109
Recipe
4-11:
Setting an Active HTTP Proxy with Joebox
...........................
Ill
Recipe
4-12:
Scanning for Artifacts with Sandbox Results
..........................112
5
Researching Domains and IP Addresses
......................................
П9
Recipe
5-1:
Researching Domains with WHOIS
..................................120
Recipe
5-2:
Resolving DNS Hostnames
........................................125
Recipe
5-3:
Obtaining IP WHOIS Records
......................................129
Recipe
5-4:
Querying Passive DNS with BFK
....................................132
Recipe
5-5:
Checking DNS Records with Robtex
..................................133
Recipe
5-6:
Performing a Reverse IP Search with DomainTools
......................134
Recipe
5-7:
Initiating Zone Transfers with dig
...................................135
Recipe
5-8:
Brute-forcing
Subdomains
with dnsmap
..............................137
Recipe
5-9:
Mapping IP Addresses to ASNs via Shadowserver
.......................138
Recipe
5-Ю:
Checking IP Reputation with RBLs
.................................140
Recipe
5-11:
Detecting Fast Flux with Passive DNS and TTLs
.......................143
Recipe
5-12:
Tracking Fast Flux Domains
......................................146
Recipe
5-13:
Static Maps with Maxmind, matplotlib, and pygeoip
....................148
Recipe
5-14:
Interactive Maps with Google Charts API
............................152
6
Documents,
Shellcode,
and URLs
...........................................155
Recipe
6-1:
AnalyzingJavaScript with Spidermonkey
............................156
Recipe
6-2:
Automatically Decoding JavaScript withjsunpack
......................159
Recipe
6-3:
Optimizing Jsunpack-n
Decodings
for Speed and Completeness
............162
Recipe
6-4:
Triggering exploits by Emulating Browser DOM Elements
................163
Recipe
6-5:
Extracting JavaScript from PDF Files with pdj.py
.......................168
Recipe
6-6:
Triggering Exploits by Faking PDF Software Versions
...................172
Recipe
6-7:
Leveraging
Didier Stevens s
PDF Tools
...............................175
Recipe
6-8:
Determining which Vulnerabilities a PDF File Exploits
..................178
Recipe
6-9:
Disassembling
Shellcode
with DiStorm
...............................185
Recipe
6-10:
Emulating
Shellcode
with
Libému
..................................190
Recipe
6-11:
Analyzing Microsoft Office Files with OfficeMalScanner
................ . .193
Recipe
6-12:
Debugging Office
Shellcode
with
DisView
and MalHost-setup
............200
Recipe
6-13:
Extracting HTTP Files from Packet Captures withjsunpack
..............204
Recipe
6-Й:
Graphing URL Relationships withjsunpack
..........................206
7 Malware
Labs
.............................................................211
Recipe
7-1:
Routing TCP/IP Connections in Your Lab
..............................215
Recipe
7-2:
Capturing and Analyzing Network Traffic
.............................217
Recipe
7-3:
Simulating the Internet with INetSim
................................221
Recipe
7-4:
Manipulating HTTP/HTTPS with Burp Suite
..........................225
Recipe
7-5:
Using Joe Stewart s Truman
........................................228
Recipe
7-6:
Preserving Physical Systems with Deep Freeze
.........................229
Recipe
7-7:
Cloning and Imaging Disks with FOG
................................232
Recipe
7-8:
Automating FOG Tasks with the MySQL Database
.....................236
8
Automation
.............................................................239
Recipe
8-1:
Automated
Malware
Analysis with VirtualBox
.........................242
Recipe
8-2:
Working with VirtualBox Disk and Memory Images
.....................248
Recipe
8-3:
Automated
Malware
Analysis with VMware
...........................250
Recipe
8-4:
Capturing Packets with TShark via Python
............................254
Recipe
8-5:
Collecting Network Logs with INetSim via Python
......................256
Recipe
8-6:
Analyzing Memory Dumps with Volatility
............................258
Recipe
8-7:
Putting all the Sandbox Pieces Together
...............................260
Recipe
8-8:
Automated Analysis with ZeroWine and QEMU
........................
27J
Recipe
8-9:
Automated Analysis with Sandboxie and Buster
.......................276
9
Dynamic Analysis
.........................................................283
Recipe
9-1:
Logging API calls with Process Monitor
..............................286
Recipe
9-2:
Change Detection with Regshot
....................................288
Recipe
9-3:
Receiving File System Change Notifications
...........................290
Recipe
9-4:
Receiving Registry Change Notifications
..............................294
Recipe
9-5:
Handle Table Diffing
.............................................295
Recipe
9-6:
Exploring Code Injection with HandleDiff
............................300
Recipe
9-7:
Watching Bankpatch.C Disable Windows File Protection
.................301
Recipe
9-8:
Building an API Monitor with Microsoft Detours
.......................304
Recipe
9-9:
Following Child Processes with Your API Monitor
.......................311
Recipe
9-10:
Capturing Process, Thread, and Image Load Events
....................314
Recipe
9-11:
Preventing Processes from Terminating
..............................321
Recipe
9-12:
Preventing Malwarefrom Deleting Files
.............................324
Recipe
9-13:
Preventing Drivers from Loading
...................................325
Recipe
9-14:
Using the Data Preservation Module
................................327
Recipe
9-15:
Creating a Custom Command Shell with ReactOS
.....................330
W
Malware Forensics.........................................................337
Recipe
10-1:
Discovering Alternate Data Streams with TSK
........................337
Recipe
10-2:
Detecting Hidden Files and Directories with TSK
......................341
Recipe
10-3:
Finding Hidden Registry Data with Microsoft s Offline API
...............349
Recipe
10-4:
Bypassing Poison Ivy s Locked Files
................................355
Recipe
10-5:
Bypassing Conficker s File System ACL Restrictions
....................359
Recipe
10-6:
Scanning for Rootkits with GMER
..................................363
Recipe
10-7:
Detecting HTML Injection by Inspecting IE s DOM
.....................367
Recipe
10-8:
Registry Forensics with RegRipper Plug-ins
..........................377
Recipe
10-9:
Detecting Rogue-Installed PKI Certificates
...........................384
Recipe
10-10:
Examining
Malware
that Leaks Data into the Registry
.................388
ti Debugging
Malware......................................................395
Recipe
11-1:
Opening and Attaching to Processes
.................................396
Recipe
11-2:
Configuring a]IT Debugger for
Shellcode
Analysis
.....................398
Recipe
11-3:
Getting Familiar with the Debugger GUI
.............................400
Recipe
11-4:
Exploring Process Memory and Resources
............................407
Recipe
11-5:
Controlling Program Execution
....................................410
Recipe
11-6:
Setting and Catching Breakpoints
..................................412
Recipe
11-7:
Using Conditional Log Breakpoints
.................................415
Recipe
11-8:
Debugging with Python Scripts and PyCommands
.....................418
Recipe
11-9:
Detecting
Shellcode in
Binary Files
.................................421
Recipe
11-10:
Investigating Silentbanker s API Hooks
.............................426
Recipe
11-11:
Manipulating Process Memory with WinAppDbg Tools
.................431
Recipe
11-12:
Designing a Python API Monitor with WinAppDbg
....................433
12
De-Obfuscation
...........................................................441
Recipe
12-1:
Reversing XOR Algorithms
in Python...............................441
Recipe
12-2:
Detecting XOR Encoded Data with yaratize
...........................446
Recipe
12-3:
Decoding Base64 with Special Alphabets
.............................448
Recipe
12-4:
Isolating Encrypted Data in Packet Captures
.........................452
Recipe
12-5:
Finding Crypto with SnD
Reverser
Tool, FindCrypt, and
Kanal...........454
Recipe
12-6:
Porting OpenSSL Symbols with Zynamics BinDijFf
.....................456
Recipe
12-7:
Decrypting Data in Python with PyCrypto
...........................458
Recipe
12-8:
Finding
OEP
in Packed
Malware...................................461
Recipe
12-9:
Dumping Process Memory with LordPE
.............................465
Recipe
12-10:
Rebuilding Import Tables with ImpREC
.............................467
Recipe
12-11:
Cracking Domain Generation Algorithms
...........................476
Recipe
12-12:
Decoding Strings with x86emu and Python
.........................481
В
Working with DLLs
.......................................................487
Recipe
13-1:
Enumerating DLL Exports
.......................................488
Recipe
13-2:
Executing DLLs with rundll32.exe
.................................491
Recipe
13-3:
Bypassing Host Process Restrictions
................................493
Recipe
13-4:
Calling DLL Exports Remotely with rundll32ex
.......................495
Recipe
13-5:
Debugging DLLs with LOADDLL.EXE
..............................499
Recipe
13-6:
Catching Breakpoints on DLL Entry Points
..........................501
Recipe
13-7:
Executing DLLs as a Windows Service
..............................502
Recipe
13-8:
Converting DLLs to Standalone
Exécutables
..........................507
14
Kernel Debugging
.........................................................511
Recipe
14-1:
Local Debugging with LiveKd
.....................................513
Recipe
14-2:
Enabling the Kernel s Debug Boot Switch
.............................514
Recipe
14-3:
Debug a VMware Workstation Guest (on Windows)
....................517
Recipe
14-4:
Debug a Parallels Guest (on Mac OS X)
.............................519
Recipe
14-5:
Introduction to WtnDbg Commands Ana Controls
.....................521
Recipe
14-6:
Exploring Processes and Process Contexts
............................528
Recipe
14-7:
Exploring Kernel Memory
........................................534
Recipe
14-8:
Catching Breakpoints on Driver Load
...............................540
Recipe
14-9:
Unpacking Drivers to
OEP
........................................548
Recipe
14-10:
Dumping and Rebuilding Drivers
..................................555
Recipe
14-11:
Detecting Rootkits with WinDbg Scripts
............................561
Recipe
14-12:
Kernel Debugging with IDA Pro
...................................566
15
Memory Forensics with Volatility
...........................................571
Recipe
15-1:
Dumping Memory with MoonSols Windows Memory Toolkit
.............572
Recipe
15-2:
Remote, Read-only Memory Acquisition with F-Response
................575
Recipe
15-3:
Accessing Virtual Machine Memory Files
............................576
Recipe
15-4:
Volatility in a Nutshell
...........................................578
Recipe
15-5:
Investigating processes in Memory Dumps
............................581
Recipe
15-6:
Detecting DKOM Attacks with psscan
...............................588
Recipe
15-7:
Exploring csrss.exe s Alternate Process Listings
........................591
Recipe
15-8:
Recognising Process Context Tricks
................................593
16
Memory Forensics: Code Injection and Extraction
............................601
Recipe
16-1:
Hunting Suspicious Loaded DLLs
..................................603
Recipe
16-2:
Detecting Unlinked DLLs with Idrjnodules
..........................605
Recipe
16-3:
Exploring Virtual Address Descriptors
(VAD)
.........................610
Recipe
16-4:
Translating Page Protections
......................................614
Recipe
16-5:
Finding Artifacts in Process Memory
................................617
Recipe
16-6:
Identifying Injected Code with
Malfind
and
YARA
.....................619
Recipe
16-7:
Rebuilding Executable Images from Memory
..........................627
Recipe
16-8:
Scanning for Imported Functions with impsccm
........................629
Recipe
16-9:
Dumping Suspicious Kernel Modules
...............................633
17
Memory Forensics: Rootkits
...............................................637
Recipe
17-1:
Detecting 1AT Hooks
.............................................637
Recipe
17-2:
Detecting EAT Hooks
............................................639
Recipe
17-3:
Detecting Inline API Hooks
........................................641
Recipe
17-4:
Detecting Interrupt Descriptor Table (IDT) Hooks
.....................644
Recipe
17-5:
Detecting Driver
ÍRP
Hooks
.......................................646
Recipe
17-6:
Detecting SSDT Hooks
..........................................650
Recipe
17-7:
Automating Damn Near Everything with ssdt_ex
......................654
Recipe
17-8:
Finding Rootkits with Detached Kernel Threads
.......................655
Recipe
17-9:
Identifying System-Wide Notification Routines
........................658
Recipe
17-10:
Locating Rogue Service Processes with svcscan
.......................661
Recipe
17-11:
Scanning for Mutex Objects with
mutantscan
.........................669
18
Memory Forensics: Network and Registry
..................................673
Recipe
18-1:
Exploring Socket and Connection Objects
............................673
Recipe
18-2:
Analyzing Network Artifacts Left by Zeus
............................678
Recipe
18-3:
Detecting Attempts to Hide TCP/IP Activity
...........................680
Recipe
18-4:
Detecting Raw Sockets and Promiscuous NICs
........................682
Recipe
18-5:
Analyzing Registry Artifacts with Memory Registry Tools
...............685
Recipe
18-6:
Sorting Keys by Last Written Timestamp
............................689
Recipe
18-7:
Using Volatility with RegRipper
....................................692
Index
....................................................................695
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV037367147 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)700413862 (DE-599)HBZHT016590050 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01802nam a2200397zc 4500</leader><controlfield tag="001">BV037367147</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170324 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110427s2011 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470613030</subfield><subfield code="c">(pbk.) : GBP 39.99</subfield><subfield code="9">978-0-470-61303-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)700413862</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT016590050</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Malware analyst's cookbook and DVD</subfield><subfield code="b">tools and techniques for fighting malicious code</subfield><subfield code="c">Michael Hale Ligh ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVI, 716 S.</subfield><subfield code="b">Ill.</subfield><subfield code="e">1 DVD (12 cm)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">DVD enth.: Evidence files, annotated videos, source code, Windows and Linux tools, over 50 original programs in Python, C/C++ and Perl</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer security.</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ligh, Michael Hale</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-00336-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-00829-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-00830-0</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.gbv.de/dms/weimar/toc/63853092X_toc.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022520571&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-022520571</subfield></datafield></record></collection> |
id | DE-604.BV037367147 |
illustrated | Illustrated |
indexdate | 2024-07-09T23:22:46Z |
institution | BVB |
isbn | 9780470613030 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-022520571 |
oclc_num | 700413862 |
open_access_boolean | |
owner | DE-29T DE-703 DE-706 DE-739 DE-188 DE-M347 DE-Aug4 DE-861 |
owner_facet | DE-29T DE-703 DE-706 DE-739 DE-188 DE-M347 DE-Aug4 DE-861 |
physical | XXVI, 716 S. Ill. 1 DVD (12 cm) |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Wiley |
record_format | marc |
spelling | Malware analyst's cookbook and DVD tools and techniques for fighting malicious code Michael Hale Ligh ... Indianapolis, Ind. Wiley 2011 XXVI, 716 S. Ill. 1 DVD (12 cm) txt rdacontent n rdamedia nc rdacarrier DVD enth.: Evidence files, annotated videos, source code, Windows and Linux tools, over 50 original programs in Python, C/C++ and Perl Malware (DE-588)4687059-3 gnd rswk-swf Malware (Computer software) Computer security. Malware (DE-588)4687059-3 s DE-604 Ligh, Michael Hale Sonstige oth Erscheint auch als Online-Ausgabe 978-1-118-00336-7 Erscheint auch als Online-Ausgabe 978-1-118-00829-4 Erscheint auch als Online-Ausgabe 978-1-118-00830-0 http://www.gbv.de/dms/weimar/toc/63853092X_toc.pdf Inhaltsverzeichnis Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022520571&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Malware analyst's cookbook and DVD tools and techniques for fighting malicious code Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4687059-3 |
title | Malware analyst's cookbook and DVD tools and techniques for fighting malicious code |
title_auth | Malware analyst's cookbook and DVD tools and techniques for fighting malicious code |
title_exact_search | Malware analyst's cookbook and DVD tools and techniques for fighting malicious code |
title_full | Malware analyst's cookbook and DVD tools and techniques for fighting malicious code Michael Hale Ligh ... |
title_fullStr | Malware analyst's cookbook and DVD tools and techniques for fighting malicious code Michael Hale Ligh ... |
title_full_unstemmed | Malware analyst's cookbook and DVD tools and techniques for fighting malicious code Michael Hale Ligh ... |
title_short | Malware analyst's cookbook and DVD |
title_sort | malware analyst s cookbook and dvd tools and techniques for fighting malicious code |
title_sub | tools and techniques for fighting malicious code |
topic | Malware (DE-588)4687059-3 gnd |
topic_facet | Malware |
url | http://www.gbv.de/dms/weimar/toc/63853092X_toc.pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022520571&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lighmichaelhale malwareanalystscookbookanddvdtoolsandtechniquesforfightingmaliciouscode |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis