Mastering malware analysis: the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt
[September 2022]
|
Ausgabe: | Second edition |
Schlagworte: | |
Beschreibung: | Auf dem Cover: "2nd edition" |
Beschreibung: | xxi, 547 Seiten Illustrationen |
ISBN: | 9781803240244 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049564223 | ||
003 | DE-604 | ||
005 | 20240328 | ||
007 | t | ||
008 | 240209s2022 a||| |||| 00||| eng d | ||
020 | |a 9781803240244 |9 978-1-80324-024-4 | ||
035 | |a (DE-599)BVBBV049564223 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Kleymenov, Alexey |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mastering malware analysis |b the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |c Alexey Kleymenov, Amr Thabet |
250 | |a Second edition | ||
264 | 1 | |a Birmingham ; Mumbai |b Packt |c [September 2022] | |
264 | 4 | |c © 2022 | |
300 | |a xxi, 547 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Auf dem Cover: "2nd edition" | ||
650 | 0 | 7 | |a Analyse |0 (DE-588)4122795-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 1 | |a Analyse |0 (DE-588)4122795-5 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Thabet, Amr |e Sonstige |4 oth | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034909568 |
Datensatz im Suchindex
_version_ | 1804186417511792640 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Kleymenov, Alexey |
author_facet | Kleymenov, Alexey |
author_role | aut |
author_sort | Kleymenov, Alexey |
author_variant | a k ak |
building | Verbundindex |
bvnumber | BV049564223 |
classification_rvk | ST 276 ST 277 |
ctrlnum | (DE-599)BVBBV049564223 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | Second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01398nam a2200397 c 4500</leader><controlfield tag="001">BV049564223</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240328 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240209s2022 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803240244</subfield><subfield code="9">978-1-80324-024-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049564223</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kleymenov, Alexey</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mastering malware analysis</subfield><subfield code="b">the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks</subfield><subfield code="c">Alexey Kleymenov, Amr Thabet</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">[September 2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxi, 547 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Cover: "2nd edition"</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Analyse</subfield><subfield code="0">(DE-588)4122795-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Analyse</subfield><subfield code="0">(DE-588)4122795-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thabet, Amr</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034909568</subfield></datafield></record></collection> |
id | DE-604.BV049564223 |
illustrated | Illustrated |
index_date | 2024-07-03T23:29:07Z |
indexdate | 2024-07-10T10:10:48Z |
institution | BVB |
isbn | 9781803240244 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034909568 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xxi, 547 Seiten Illustrationen |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt |
record_format | marc |
spelling | Kleymenov, Alexey Verfasser aut Mastering malware analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Alexey Kleymenov, Amr Thabet Second edition Birmingham ; Mumbai Packt [September 2022] © 2022 xxi, 547 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Auf dem Cover: "2nd edition" Analyse (DE-588)4122795-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Malware (DE-588)4687059-3 s Analyse (DE-588)4122795-5 s Computersicherheit (DE-588)4274324-2 s DE-604 Thabet, Amr Sonstige oth |
spellingShingle | Kleymenov, Alexey Mastering malware analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Analyse (DE-588)4122795-5 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4122795-5 (DE-588)4274324-2 (DE-588)4687059-3 |
title | Mastering malware analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
title_auth | Mastering malware analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
title_exact_search | Mastering malware analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
title_exact_search_txtP | Mastering malware analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
title_full | Mastering malware analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Alexey Kleymenov, Amr Thabet |
title_fullStr | Mastering malware analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Alexey Kleymenov, Amr Thabet |
title_full_unstemmed | Mastering malware analysis the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Alexey Kleymenov, Amr Thabet |
title_short | Mastering malware analysis |
title_sort | mastering malware analysis the complete malware analyst s guide to combating malicious software apt cybercrime and iot attacks |
title_sub | the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks |
topic | Analyse (DE-588)4122795-5 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd |
topic_facet | Analyse Computersicherheit Malware |
work_keys_str_mv | AT kleymenovalexey masteringmalwareanalysisthecompletemalwareanalystsguidetocombatingmalicioussoftwareaptcybercrimeandiotattacks AT thabetamr masteringmalwareanalysisthecompletemalwareanalystsguidetocombatingmalicioussoftwareaptcybercrimeandiotattacks |