LEADER 00941nam0-22002891i-450- 001 990000101960403321 035 $a000010196 035 $aFED01000010196 035 $a(Aleph)000010196FED01 035 $a000010196 100 $a20011111d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aMutamenti avvenuti nella configurazione del litorale tra Pisa e Orbetello dal pliocene in poi$fGiuseppe Merciai. 210 $aPisa$cFratelli Nistri$d1910 215 $a148 p., 17 tav.$cill.$d32 cm 610 0 $aToscana$aCoste$aVariazioni 676 $a551.457 700 1$aMerciai,$bGiuseppe$f<1877-1940>$0333008 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000101960403321 952 $a13 M 27 09$b2257$fFINBC 959 $aFINBC 996 $aMutamenti avvenuti nella configurazione del litorale tra Pisa e Orbetello dal pliocene in poi$9116217 997 $aUNINA DB $aING01 LEADER 01285nam--2200385---450 001 990000586570203316 005 20201109104808.0 010 $a88-420-3630-7 035 $a0058657 035 $aUSA010058657 035 $a(ALEPH)000058657USA01 035 $a0058657 100 $a20010726d1990----km-y0itay0103----ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aGuglielmo il maresciallo$el'avventura del cavaliere$fGeorges Duby$gtraduzione di Maria Garin 210 $aRoma$cLaterza$d1990 215 $a192 p.$d21 cm 225 2 $aBiblioteca universale Laterza$v323 312 $aGuillaume le Maréchal ou le meilleur chevalier du monde 410 $12001$aBiblioteca universale Laterza$v323 454 $12001$aGuillaume le Maréchal ou le meilleur chevalier du monde$922735 606 0 $aPembroke, William Marshall 606 0 $aCavalleria$yInghilterra$zSec. 12.-13. 676 $a942.0310924 700 1$aDUBY,$bGeorges$f<1919-1996>$011158 702 1$aGARIN,$bMaria 801 0$aIT$bsalbc$gISBD 912 $a990000586570203316 951 $aX.1.B. 1041(VARIE COLL. 552/323)$b128414 L.M.$cVARIE COLL. 959 $aBK 969 $aUMA 996 $aGuillaume le maréchal, ou Le meilleur chevalier du monde$922735 997 $aUNISA LEADER 05212nam 2200637 a 450 001 9910785237703321 005 20230521171948.0 010 $a1-118-00829-4 010 $a1-282-84940-9 010 $a9786612849404 010 $a1-118-00336-5 035 $a(CKB)2670000000047123 035 $a(EBL)624374 035 $a(OCoLC)699474821 035 $a(SSID)ssj0000439284 035 $a(PQKBManifestationID)11312606 035 $a(PQKBTitleCode)TC0000439284 035 $a(PQKBWorkID)10460181 035 $a(PQKB)10067534 035 $a(Au-PeEL)EBL624374 035 $a(CaPaEBR)ebr10469873 035 $a(CaONFJC)MIL284940 035 $a(CaSebORM)9780470613030 035 $a(MiAaPQ)EBC624374 035 $a(EXLCZ)992670000000047123 100 $a20100727d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMalware analyst's cookbook and dvd$b[electronic resource] $etools and techniques for fighting malicious code /$fMichael Ligh ... [et al.] 205 $a1st edition 210 $aIndianapolis, Ind. $cWiley Pub., Inc$d2011 215 $a1 online resource (746 p.) 300 $aIncludes index. 311 $a0-470-61303-3 327 $aMalware Analyst's Cookbook and DVD; Contents; Introduction; On The Book's DVD; Chapter 1: Anonymizing Your Activities; Recipe 1-1: Anonymous Web Browsing with Tor; Recipe 1-2: Wrapping Wget and Network Clients with Torsocks; Recipe 1-3: Multi-platform Tor-enabled Downloader in Python; Recipe 1-4: Forwarding Traffic through Open Proxies; Recipe 1-5: Using SSH Tunnels to Proxy Connections; Recipe 1-6: Privacy-enhanced Web browsing with Privoxy; Recipe 1-7: Anonymous Surfing with Anonymouse.org; Recipe 1-8: Internet Access through Cellular Networks 327 $aRecipe 1-9: Using VPNs with Anonymizer UniversalChapter 2: Honeypots; Recipe 2-1: Collecting Malware Samples with Nepenthes; Recipe 2-2: Real-Time Attack Monitoring with IRC Logging; Recipe 2-3: Accepting Nepenthes Submissions over HTTP with Python; Recipe 2-4: Collecting Malware Samples with Dionaea; Recipe 2-5: Accepting Dionaea Submissions over HTTP with Python; Recipe 2-6: Real-time Event Notification and Binary Sharing with XMPP; Recipe 2-7: Analyzing and Replaying Attacks Logged by Dionea; Recipe 2-8: Passive Identification of Remote Systems with p0f 327 $aRecipe 2-9: Graphing Dionaea Attack Patterns with SQLite and GnuplotChapter 3: Malware Classification; Recipe 3-1: Examining Existing ClamAV Signatures; Recipe 3-2: Creating a Custom ClamAV Database; Recipe 3-3: Converting ClamAV Signatures to YARA; Recipe 3-4: Identifying Packers with YARA and PEiD; Recipe 3-5: Detecting Malware Capabilities with YARA; Recipe 3-6: File Type Identification and Hashing in Python; Recipe 3-7: Writing a Multiple-AV Scanner in Python; Recipe 3-8: Detecting Malicious PE Files in Python; Recipe 3-9: Finding Similar Malware with ssdeep 327 $aRecipe 3-10: Detecting Self-modifying Code with ssdeepRecipe 3-11: Comparing Binaries with IDA and BinDiff; Chapter 4: Sandboxes and Multi-AV Scanners; Recipe 4-1: Scanning Files with VirusTotal; Recipe 4-2: Scanning Files with Jotti; Recipe 4-3: Scanning Files with NoVirusThanks; Recipe 4-4: Database-Enabled Multi-AV Uploader in Python; Recipe 4-5: Analyzing Malware with ThreatExpert; Recipe 4-6: Analyzing Malware with CWSandbox; Recipe 4-7: Analyzing Malware with Anubis; Recipe 4-8: Writing AutoIT Scripts for Joebox; Recipe 4-9: Defeating Path-dependent Malware with Joebox 327 $aRecipe 4-10: Defeating Process-dependent DLLs with JoeboxRecipe 4-11: Setting an Active HTTP Proxy with Joebox; Recipe 4-12: Scanning for Artifacts with Sandbox Results; Chapter 5: Researching Domains and IP Addresses; Recipe 5-1: Researching Domains with WHOIS; Recipe 5-2: Resolving DNS Hostnames; Recipe 5-3: Obtaining IP WHOIS Records; Recipe 5-4: Querying Passive DNS with BFK; Recipe 5-5: Checking DNS Records with Robtex; Recipe 5-6: Performing a Reverse IP Search with DomainTools; Recipe 5-7: Initiating Zone Transfers with dig; Recipe 5-8: Brute-forcing Subdomains with dnsmap 327 $aRecipe 5-9: Mapping IP Addresses to ASNs via Shadowserver 330 $aA computer forensics ""how-to"" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.Security professionals face a constant battle 606 $aMalware (Computer software) 615 0$aMalware (Computer software) 676 $a005.8 676 $a005.84 700 $aLigh$b Michael W$01481325 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910785237703321 996 $aMalware analyst's cookbook and dvd$93698205 997 $aUNINA