01559nam a2200373 a 4500001001200000003000800012006001900020007001500039008004100054010001700095020001500112020001800127020002700145040002100172035002100193050002900214082001600243100002300259245015000282260004600432300002500478500002000503505019000523533015200713650003200865650002200897650003500919650002300954655002900977700001901006710001701025856012601042999001701168ebr10574799CaPaEBRm u cr cn|||||||||120210s2012 caua s 001 0 eng d z 2012000214 z1593272901 z9781593272906 z9781593274306 (e-book) aCaPaEBRcCaPaEBR a(OCoLC)79866968114aQA76.76.C68bS534 2012eb04a005.8/42231 aSikorski, Michael.10aPractical malware analysish[electronic resource] :bthe hands-on guide to dissecting malicious software /cby Michael Sikorski and Andrew Honig. aSan Francisco :bNo Starch Press,cc2012. axxxi, 766 p. :bill. aIncludes index.0 apt. 1. Basic analysis -- pt. 2. Advanced static analysis -- pt. 3. Advanced dynamic analysis -- pt. 4. Malware functionality -- pt. 5. Anti-reverse-engineering -- pt. 6. Special topics. aElectronic reproduction.bPalo Alto, Calif. :cebrary,d2011.nAvailable via World Wide Web.nAccess may be limited to ebrary affiliated libraries. 0aMalware (Computer software) 0aComputer viruses. 0aDebugging in computer science. 0aComputer security. 7aElectronic books.2local1 aHonig, Andrew.2 aebrary, Inc.40uhttp://site.ebrary.com/lib/rucke/Doc?id=10574799zAn electronic book accessible through the World Wide Web; click to view c78899d78899