Practical malware analysis the hands-on guide to dissecting malicious software /
Na minha lista:
Autor principal: | Sikorski, Michael |
---|---|
Autor Corporativo: | ebrary, Inc |
Outros Autores: | Honig, Andrew |
Formato: | Recurso Eletrônico livro eletrônico |
Idioma: | inglês |
Publicado em: |
San Francisco :
No Starch Press,
c2012.
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registros relacionados
Cuckoo malware analysis : analyze malware using Cuckoo Sandbox /
por: Oktavianto, Digit
Publicado em: (2013)
por: Oktavianto, Digit
Publicado em: (2013)
Malware analyst's cookbook and dvd tools and techniques for fighting malicious code /
por: Ligh, Michael W.
Publicado em: (2011)
por: Ligh, Michael W.
Publicado em: (2011)
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
por: Ligh, Michael Hale
Publicado em: (2014)
por: Ligh, Michael Hale
Publicado em: (2014)
Software error detection through testing and analysis
por: Huang, J. C., 1935-
Publicado em: (2009)
por: Huang, J. C., 1935-
Publicado em: (2009)
Static analysis of software the abstract interpretation /
Publicado em: (2012)
Publicado em: (2012)
The art of software testing
por: Myers, Glenford J., 1946-
Publicado em: (2012)
por: Myers, Glenford J., 1946-
Publicado em: (2012)
Hacking exposed : malware and rootkits : security secrets & solutions /
por: Elisan, Christopher C., et al.
Publicado em: (2017)
por: Elisan, Christopher C., et al.
Publicado em: (2017)
Tools and methods for analysis, debugging, and performance improvement of equation-based models /
por: Sjolund, Martin
Publicado em: (2015)
por: Sjolund, Martin
Publicado em: (2015)
Software testing with Visual Studio team system 2008 a comprehensive and concise guide to testing your software applications with Visual Studio team system 2008 /
por: Subashni S.
Publicado em: (2008)
por: Subashni S.
Publicado em: (2008)
Software testing using Visual Studio 2012
por: Satheesh Kumar, N.
Publicado em: (2013)
por: Satheesh Kumar, N.
Publicado em: (2013)
Computer viruses and other malicious software a threat to the Internet economy.
Publicado em: (2009)
Publicado em: (2009)
Open source fuzzing tools
Publicado em: (2007)
Publicado em: (2007)
Software testing using Visual Studio 2010 a step-by-step guide to understanding the features and concepts of testing applications using Visual studio /
por: Subashni S.
Publicado em: (2010)
por: Subashni S.
Publicado em: (2010)
The science of debugging
por: Telles, Matthew A.
Publicado em: (2001)
por: Telles, Matthew A.
Publicado em: (2001)
Debugging Visual FoxPro applications
por: Folsom, Nancy
Publicado em: (2002)
por: Folsom, Nancy
Publicado em: (2002)
Configuring Symantec Antivirus, Corporate Edition
Publicado em: (2003)
Publicado em: (2003)
Defense and detection strategies against Internet worms
por: Nazario, Jose
Publicado em: (2004)
por: Nazario, Jose
Publicado em: (2004)
The IDA pro book the unofficial guide to the world's most popular disassembler /
por: Eagle, Chris
Publicado em: (2011)
por: Eagle, Chris
Publicado em: (2011)
How not to program in C++ 111 broken programs and 3 working ones, or why does 2+2 = 5986? /
por: Oualline, Steve
Publicado em: (2003)
por: Oualline, Steve
Publicado em: (2003)
JavaScript testing beginner's guide ; test and debug JavaScript the easy way /
por: Eugene, Liang Yuxian
Publicado em: (2010)
por: Eugene, Liang Yuxian
Publicado em: (2010)
Fuzzing for software security testing and quality assurance
por: Takanen, Ari
Publicado em: (2008)
por: Takanen, Ari
Publicado em: (2008)
Django 1.1 testing and debugging building rigorously tested and bug-free Django applications /
por: Tracey, Karen M.
Publicado em: (2010)
por: Tracey, Karen M.
Publicado em: (2010)
Software safety and security tools for analysis and verification /
Publicado em: (2012)
Publicado em: (2012)
Software system reliability and security
Publicado em: (2007)
Publicado em: (2007)
Introduction to computers and information systems with hands-on software tutorials /
Publicado em: (1991)
Publicado em: (1991)
Combating spyware in the enterprise
Publicado em: (2006)
Publicado em: (2006)
Trust and security in collaborative computing
por: Zou, Xukai, 1963-
Publicado em: (2008)
por: Zou, Xukai, 1963-
Publicado em: (2008)
Crackproof your software the best ways to protect your software against crackers /
por: C̆ervĕn, Pavol
Publicado em: (2002)
por: C̆ervĕn, Pavol
Publicado em: (2002)
Software estimation best practices, tools & techniques a complete guide for software project estimators /
por: Chemuturi, Murali, 1950-
Publicado em: (2009)
por: Chemuturi, Murali, 1950-
Publicado em: (2009)
Practical guide to software quality management
por: Horch, John W.
Publicado em: (2003)
por: Horch, John W.
Publicado em: (2003)
Summary of a workshop on software certification and dependability
Publicado em: (2004)
Publicado em: (2004)
Protecting games a security handbook for game developers and publishers /
por: Davis, Steven B.
Publicado em: (2008)
por: Davis, Steven B.
Publicado em: (2008)
The software audit guide /
por: Helgeson, John W., 1945-
Publicado em: (2009)
por: Helgeson, John W., 1945-
Publicado em: (2009)
Guide to advanced software testing
por: Hass, Anne Mette Jonassen
Publicado em: (2008)
por: Hass, Anne Mette Jonassen
Publicado em: (2008)
Spring Security 3.1 secure your web applications from hackers with the step-by-step guide /
por: Winch, Robert
Publicado em: (2012)
por: Winch, Robert
Publicado em: (2012)
The computer triangle : hardware, software, people /
por: Oakman, Robert L., 1941-
Publicado em: (1995)
por: Oakman, Robert L., 1941-
Publicado em: (1995)
Computer software : programming systems for digital computers /
por: Flores, Ivan
Publicado em: (1965)
por: Flores, Ivan
Publicado em: (1965)
JIRA 6.x administration cookbook : over 100 hands-on recipes to help you efficiently administer, customize, and extend your JIRA 6 implementation /
por: Li, Patrick
Publicado em: (2014)
por: Li, Patrick
Publicado em: (2014)
Patterns model-driven development using IBM Rational Software Architect /
por: Swithinbank, Peter
Publicado em: (2005)
por: Swithinbank, Peter
Publicado em: (2005)
Software specification methods
Publicado em: (2006)
Publicado em: (2006)
Registros relacionados
-
Cuckoo malware analysis : analyze malware using Cuckoo Sandbox /
por: Oktavianto, Digit
Publicado em: (2013) -
Malware analyst's cookbook and dvd tools and techniques for fighting malicious code /
por: Ligh, Michael W.
Publicado em: (2011) -
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory /
por: Ligh, Michael Hale
Publicado em: (2014) -
Software error detection through testing and analysis
por: Huang, J. C., 1935-
Publicado em: (2009) -
Static analysis of software the abstract interpretation /
Publicado em: (2012)