Identifying Malicious Code Through Reverse Engineering

Identifying Malicious Code Through Reverse Engineering

4.11 - 1251 ratings - Source

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies. Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.MMXP R [7 byte offset] 00 00 FF FF FF FF [7 byte offset] Windows Help file HLP .. AiAiAiAi 00 01 00 00 4D 53 . ... AAp. Mujahideen Secrets 2 encrypted file ENC [512 byte offset] 00 6E 1E F0 [512 byte offset] PowerPoint presentation subheaderanbsp;...

Title:Identifying Malicious Code Through Reverse Engineering
Author: Abhishek Singh
Publisher:Springer Science & Business Media - 2009-03-26

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA