Learning malware analysis : (Record no. 267801)

MARC details
000 -LEADER
fixed length control field 01402aam a2200325 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field rda
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20221123151617.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field a|||| r|||| 001 0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210309t2018 uk a||| |||| 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781788392501
Qualifying information paperback
040 ## - CATALOGING SOURCE
Original cataloging agency rda
Language of cataloging eng
Transcribing agency rda
Modifying agency IE-GyGMIT
Description conventions rda
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name K A, Monnappa
Relator term author
245 10 - TITLE STATEMENT
Title Learning malware analysis :
Remainder of title explore the concepts, tools, and techniques to analyze and investigate windows malware ;
Statement of responsibility, etc. Monnappa K A
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Packt Publishing Limited
Date of publication, distribution, etc. June 2018
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham, UK :
Name of producer, publisher, distributor, manufacturer Packt,
Date of production, publication, distribution, manufacture, or copyright notice ©2018
300 ## - PHYSICAL DESCRIPTION
Extent viii, 494 pages :
Other physical details charts ;
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index
520 ## - SUMMARY, ETC.
Summary, etc. Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. This book teaches you the concepts, tools, and techniques to determine the behavior and characteristics of malware using malware analysis and memory forensics
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
9 (RLIN) 15300
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software
9 (RLIN) 5181
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Malware (Computer software)
9 (RLIN) 49767
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection
9 (RLIN) 5641
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General
960 ## - PHYSICAL LOCATION (RLIN)
Physical location, PLOC (RLIN) GA_GGEN
Quantity 1
Price €33.10
Fund GA_SB42
Order Date 15/12/2020
q 21/01/2021
Vendor Proquest Coutts
PO Number 5856
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's initials, CIN (RLIN) TD
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date last checked out Cost, replacement price Price effective from Koha item type
Not Withdrawn Not Lost Dewey Decimal Classification Not Damaged Available for Loan ATU Dublin Road ATU Dublin Road General Shelves 21/01/2021 1 33.10 8 8 005.84 J154882 17/06/2024 08/04/2024 40.20 21/01/2021 General