000 01345nam a2200349 a 4500
001 0000134244
005 20171002061246.0
006 m u
007 cr cn|||||||||
008 100727s2011 inua s 001 0 eng d
010 _z 2010933462
020 _z9781118008294 (e-book)
020 _z9781118008300 (e-book)
020 _z9781118003367 (e-book)
020 _z9780470613030 (pbk : alk. paper)
020 _z0470613033 (pbk : alk. paper)
035 _a(CaPaEBR)ebr10469873
035 _a(OCoLC)742020821
040 _aCaPaEBR
_cCaPaEBR
050 1 4 _aQA76.76.C68
_bL54 2011eb
100 1 _aLigh, Michael W.
245 1 0 _aMalware analyst's cookbook and dvd
_h[electronic resource] :
_btools and techniques for fighting malicious code /
_cMichael Ligh ... [et al.].
260 _aIndianapolis, Ind. :
_bWiley Pub., Inc,
_c2011.
300 _axxvi, 716 p. :
_bill.
500 _aIncludes index.
533 _aElectronic reproduction.
_bPalo Alto, Calif. :
_cebrary,
_d2011.
_nAvailable via World Wide Web.
_nAccess may be limited to ebrary affiliated libraries.
650 0 _aMalware (Computer software)
655 7 _aElectronic books.
_2local
710 2 _aebrary, Inc.
856 4 0 _uhttp://site.ebrary.com/lib/daystar/Doc?id=10469873
_zAn electronic book accessible through the World Wide Web; click to view
908 _a170314
942 0 0 _cEB
999 _c123393
_d123393