Mastering Malware Analysis: the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Malware analysis is a powerful investigation technique widely used in various security areas including digital forensics and incident response processes. Working through practical examples, you'll be able to analyze any type of malware you may encounter within the modern world
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2019
|
Schlagworte: | |
Zusammenfassung: | Malware analysis is a powerful investigation technique widely used in various security areas including digital forensics and incident response processes. Working through practical examples, you'll be able to analyze any type of malware you may encounter within the modern world |
Beschreibung: | xiii, 540 Seiten |
ISBN: | 9781789610789 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV046196935 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 191014s2019 |||| 00||| eng d | ||
020 | |a 9781789610789 |9 978-1-78961-078-9 | ||
035 | |a (OCoLC)1124793126 | ||
035 | |a (DE-599)BVBBV046196935 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-898 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Kleymenov, Alexey |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mastering Malware Analysis |b the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
264 | 1 | |a Birmingham |b Packt Publishing |c 2019 | |
264 | 2 | |a Ann Arbor, Michigan |b ProQuest | |
300 | |a xiii, 540 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a Malware analysis is a powerful investigation technique widely used in various security areas including digital forensics and incident response processes. Working through practical examples, you'll be able to analyze any type of malware you may encounter within the modern world | |
650 | 0 | 7 | |a Analyse |0 (DE-588)4122795-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 1 | |a Analyse |0 (DE-588)4122795-5 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Thabet, Amr |e Sonstige |4 oth | |
776 | 0 | |z 978-1-78961-487-9 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 9781789614879 |
999 | |a oai:aleph.bib-bvb.de:BVB01-031576175 |
Datensatz im Suchindex
_version_ | 1804180576006045696 |
---|---|
any_adam_object | |
author | Kleymenov, Alexey |
author_facet | Kleymenov, Alexey |
author_role | aut |
author_sort | Kleymenov, Alexey |
author_variant | a k ak |
building | Verbundindex |
bvnumber | BV046196935 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1124793126 (DE-599)BVBBV046196935 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01683nam a22004091c 4500</leader><controlfield tag="001">BV046196935</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">191014s2019 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789610789</subfield><subfield code="9">978-1-78961-078-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1124793126</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046196935</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kleymenov, Alexey</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mastering Malware Analysis</subfield><subfield code="b">the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="2"><subfield code="a">Ann Arbor, Michigan</subfield><subfield code="b">ProQuest</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiii, 540 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Malware analysis is a powerful investigation technique widely used in various security areas including digital forensics and incident response processes. Working through practical examples, you'll be able to analyze any type of malware you may encounter within the modern world</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Analyse</subfield><subfield code="0">(DE-588)4122795-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Analyse</subfield><subfield code="0">(DE-588)4122795-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thabet, Amr</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="z">978-1-78961-487-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">9781789614879</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031576175</subfield></datafield></record></collection> |
id | DE-604.BV046196935 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:37:57Z |
institution | BVB |
isbn | 9781789610789 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031576175 |
oclc_num | 1124793126 |
open_access_boolean | |
owner | DE-573 DE-898 DE-BY-UBR |
owner_facet | DE-573 DE-898 DE-BY-UBR |
physical | xiii, 540 Seiten |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing |
record_format | marc |
spelling | Kleymenov, Alexey Verfasser aut Mastering Malware Analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Birmingham Packt Publishing 2019 Ann Arbor, Michigan ProQuest xiii, 540 Seiten txt rdacontent n rdamedia nc rdacarrier Malware analysis is a powerful investigation technique widely used in various security areas including digital forensics and incident response processes. Working through practical examples, you'll be able to analyze any type of malware you may encounter within the modern world Analyse (DE-588)4122795-5 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Malware (DE-588)4687059-3 s Analyse (DE-588)4122795-5 s Computersicherheit (DE-588)4274324-2 s DE-604 Thabet, Amr Sonstige oth 978-1-78961-487-9 Erscheint auch als Online-Ausgabe 9781789614879 |
spellingShingle | Kleymenov, Alexey Mastering Malware Analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Analyse (DE-588)4122795-5 gnd Malware (DE-588)4687059-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4122795-5 (DE-588)4687059-3 (DE-588)4274324-2 |
title | Mastering Malware Analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
title_auth | Mastering Malware Analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
title_exact_search | Mastering Malware Analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
title_full | Mastering Malware Analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
title_fullStr | Mastering Malware Analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
title_full_unstemmed | Mastering Malware Analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
title_short | Mastering Malware Analysis |
title_sort | mastering malware analysis the complete malware analyst s guide to combating malicious software apt cybercrime and iot attacks |
title_sub | the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
topic | Analyse (DE-588)4122795-5 gnd Malware (DE-588)4687059-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Analyse Malware Computersicherheit |
work_keys_str_mv | AT kleymenovalexey masteringmalwareanalysisthecompletemalwareanalystsguidetocombatingmalicioussoftwareaptcybercrimeandiotattacks AT thabetamr masteringmalwareanalysisthecompletemalwareanalystsguidetocombatingmalicioussoftwareaptcybercrimeandiotattacks |