Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
Advances in Information Security

Identifying Malicious Code Through Reverse Engineering

    • ‏24٫99 US$
    • ‏24٫99 US$

وصف الناشر

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.

Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies.

Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٠٩
٣١ ديسمبر
اللغة
EN
الإنجليزية
عدد الصفحات
٢٩
الناشر
Springer US
البائع
Springer Nature B.V.
الحجم
٤٫٤
‫م.ب.‬
RP2040 Assembly Language Programming RP2040 Assembly Language Programming
٢٠٢١
Programming 8-bit PIC Microcontrollers in C Programming 8-bit PIC Microcontrollers in C
٢٠٠٨
Game Hacking Game Hacking
٢٠١٦
Purnam Purnam
٢٠٢٢
Machine Learning Using R Machine Learning Using R
٢٠١٦
The Misadventures of Detective Ghanshyam The Misadventures of Detective Ghanshyam
٢٠٢٥
Building an Enterprise Chatbot Building an Enterprise Chatbot
٢٠١٩
Firewall Policies and VPN Configurations Firewall Policies and VPN Configurations
٢٠٠٦
Cognitive Cyber Crimes in the Era of Artificial Intelligence Cognitive Cyber Crimes in the Era of Artificial Intelligence
٢٠٢٥
Insider Threats in Cyber Security Insider Threats in Cyber Security
٢٠١٠
Adaptive Cryptographic Access Control Adaptive Cryptographic Access Control
٢٠١٠
Spyware and Adware Spyware and Adware
٢٠١٠
Preserving Privacy in Data Outsourcing Preserving Privacy in Data Outsourcing
٢٠١٠
Encryption for Digital Content Encryption for Digital Content
٢٠١٠
Electronic Healthcare Information Security Electronic Healthcare Information Security
٢٠١٠