Practical malware analysis (Record no. 139880)

MARC details
000 -LEADER
fixed length control field 01611nam a2200397 a 4500
001 - CONTROL NUMBER
control field 0000150732
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20171002062312.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m u
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120210s2012 caua s 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
Canceled/invalid LC control number 2012000214
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1593272901
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781593272906
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781593274306 (e-book)
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10574799
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)798669681
040 ## - CATALOGING SOURCE
Original cataloging agency CaPaEBR
Transcribing agency CaPaEBR
050 14 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.76.C68
Item number S534 2012eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/4
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sikorski, Michael.
245 10 - TITLE STATEMENT
Title Practical malware analysis
Medium [electronic resource] :
Remainder of title the hands-on guide to dissecting malicious software /
Statement of responsibility, etc. by Michael Sikorski and Andrew Honig.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. San Francisco :
Name of publisher, distributor, etc. No Starch Press,
Date of publication, distribution, etc. c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xxxi, 766 p. :
Other physical details ill.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note pt. 1. Basic analysis -- pt. 2. Advanced static analysis -- pt. 3. Advanced dynamic analysis -- pt. 4. Malware functionality -- pt. 5. Anti-reverse-engineering -- pt. 6. Special topics.
533 ## - REPRODUCTION NOTE
Type of reproduction Electronic reproduction.
Place of reproduction Palo Alto, Calif. :
Agency responsible for reproduction ebrary,
Date of reproduction 2011.
Note about reproduction Available via World Wide Web.
-- Access may be limited to ebrary affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Malware (Computer software)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer viruses.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Debugging in computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Honig, Andrew.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element ebrary, Inc.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://site.ebrary.com/lib/daystar/Doc?id=10574799">http://site.ebrary.com/lib/daystar/Doc?id=10574799</a>
Public note An electronic book accessible through the World Wide Web; click to view
908 ## - PUT COMMAND PARAMETER (RLIN)
Put command parameter 170314
942 00 - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Book

No items available.