Identifying Malicious Code Through Reverse Engineering

Author:   Abhishek Singh
Publisher:   Springer-Verlag New York Inc.
Edition:   2009 ed.
Volume:   44
ISBN:  

9780387098241


Pages:   188
Publication Date:   26 March 2009
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $361.68 Quantity:  
Add to Cart

Share |

Identifying Malicious Code Through Reverse Engineering


Add your own review!

Overview

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies. Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.

Full Product Details

Author:   Abhishek Singh
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   2009 ed.
Volume:   44
Dimensions:   Width: 15.50cm , Height: 1.70cm , Length: 23.50cm
Weight:   0.467kg
ISBN:  

9780387098241


ISBN 10:   0387098240
Pages:   188
Publication Date:   26 March 2009
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Assembly Language.- Fundamental of Windows.- Portable Executable File Format.- Reversing Binaries for Identification of Vulnerabilities.- Fundamental of Reverse Engineering.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

lgn

al

Shopping Cart
Your cart is empty
Shopping cart
Mailing List