LEADER 01950nam 2200373 n 450 001 996391356303316 005 20200824132324.0 035 $a(CKB)1000000000667560 035 $a(EEBO)2240952804 035 $a(UnM)99861534e 035 $a(UnM)99861534 035 $a(EXLCZ)991000000000667560 100 $a19920506d1659 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 14$aThe history of the propagation & improvement of vegetables by the concurrence of art and nature$b[electronic resource] $eshewing the several ways for the propagation of plants usually cultivated in England, as they are increased by seed, off-sets, suckers, truncheons, cuttings, slips, laying, circumposition, the several ways of graftings and inoculations; as likewise the methods for improvement and best culture of field, orchard, and garden plants, the means used for remedy of annoyances incident to them; with the effect of nature, and her manner of working upon the several endeavors and operations of the artist. Written according to observations made from experience and practice: /$fby Robert Sharrock, Fellow of New Colledge 205 $aThe second edition much enlarged. 210 $aOxford $cPrinted by A. Lichfield, printer to the University, for Tho: Robinson.$d1660 [i.e. 1659] 215 $a[16], 255, [7] p 300 $aCaption title: The history of artificial propagation of plants. 300 $aAdvertisement on p. [2-7] at end. 300 $aReproduction of original in Huntington Library. 330 $aeebo-0018 606 $aVegetables$vEarly works to 1800 615 0$aVegetables 700 $aSharrock$b Robert$f1630-1684.$01005512 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996391356303316 996 $aThe history of the propagation & improvement of vegetables by the concurrence of art and nature$92311991 997 $aUNISA LEADER 05212nam 2200637 a 450 001 9910785237703321 005 20230521171948.0 010 $a1-118-00829-4 010 $a1-282-84940-9 010 $a9786612849404 010 $a1-118-00336-5 035 $a(CKB)2670000000047123 035 $a(EBL)624374 035 $a(OCoLC)699474821 035 $a(SSID)ssj0000439284 035 $a(PQKBManifestationID)11312606 035 $a(PQKBTitleCode)TC0000439284 035 $a(PQKBWorkID)10460181 035 $a(PQKB)10067534 035 $a(Au-PeEL)EBL624374 035 $a(CaPaEBR)ebr10469873 035 $a(CaONFJC)MIL284940 035 $a(CaSebORM)9780470613030 035 $a(MiAaPQ)EBC624374 035 $a(EXLCZ)992670000000047123 100 $a20100727d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMalware analyst's cookbook and dvd$b[electronic resource] $etools and techniques for fighting malicious code /$fMichael Ligh ... [et al.] 205 $a1st edition 210 $aIndianapolis, Ind. $cWiley Pub., Inc$d2011 215 $a1 online resource (746 p.) 300 $aIncludes index. 311 $a0-470-61303-3 327 $aMalware Analyst's Cookbook and DVD; Contents; Introduction; On The Book's DVD; Chapter 1: Anonymizing Your Activities; Recipe 1-1: Anonymous Web Browsing with Tor; Recipe 1-2: Wrapping Wget and Network Clients with Torsocks; Recipe 1-3: Multi-platform Tor-enabled Downloader in Python; Recipe 1-4: Forwarding Traffic through Open Proxies; Recipe 1-5: Using SSH Tunnels to Proxy Connections; Recipe 1-6: Privacy-enhanced Web browsing with Privoxy; Recipe 1-7: Anonymous Surfing with Anonymouse.org; Recipe 1-8: Internet Access through Cellular Networks 327 $aRecipe 1-9: Using VPNs with Anonymizer UniversalChapter 2: Honeypots; Recipe 2-1: Collecting Malware Samples with Nepenthes; Recipe 2-2: Real-Time Attack Monitoring with IRC Logging; Recipe 2-3: Accepting Nepenthes Submissions over HTTP with Python; Recipe 2-4: Collecting Malware Samples with Dionaea; Recipe 2-5: Accepting Dionaea Submissions over HTTP with Python; Recipe 2-6: Real-time Event Notification and Binary Sharing with XMPP; Recipe 2-7: Analyzing and Replaying Attacks Logged by Dionea; Recipe 2-8: Passive Identification of Remote Systems with p0f 327 $aRecipe 2-9: Graphing Dionaea Attack Patterns with SQLite and GnuplotChapter 3: Malware Classification; Recipe 3-1: Examining Existing ClamAV Signatures; Recipe 3-2: Creating a Custom ClamAV Database; Recipe 3-3: Converting ClamAV Signatures to YARA; Recipe 3-4: Identifying Packers with YARA and PEiD; Recipe 3-5: Detecting Malware Capabilities with YARA; Recipe 3-6: File Type Identification and Hashing in Python; Recipe 3-7: Writing a Multiple-AV Scanner in Python; Recipe 3-8: Detecting Malicious PE Files in Python; Recipe 3-9: Finding Similar Malware with ssdeep 327 $aRecipe 3-10: Detecting Self-modifying Code with ssdeepRecipe 3-11: Comparing Binaries with IDA and BinDiff; Chapter 4: Sandboxes and Multi-AV Scanners; Recipe 4-1: Scanning Files with VirusTotal; Recipe 4-2: Scanning Files with Jotti; Recipe 4-3: Scanning Files with NoVirusThanks; Recipe 4-4: Database-Enabled Multi-AV Uploader in Python; Recipe 4-5: Analyzing Malware with ThreatExpert; Recipe 4-6: Analyzing Malware with CWSandbox; Recipe 4-7: Analyzing Malware with Anubis; Recipe 4-8: Writing AutoIT Scripts for Joebox; Recipe 4-9: Defeating Path-dependent Malware with Joebox 327 $aRecipe 4-10: Defeating Process-dependent DLLs with JoeboxRecipe 4-11: Setting an Active HTTP Proxy with Joebox; Recipe 4-12: Scanning for Artifacts with Sandbox Results; Chapter 5: Researching Domains and IP Addresses; Recipe 5-1: Researching Domains with WHOIS; Recipe 5-2: Resolving DNS Hostnames; Recipe 5-3: Obtaining IP WHOIS Records; Recipe 5-4: Querying Passive DNS with BFK; Recipe 5-5: Checking DNS Records with Robtex; Recipe 5-6: Performing a Reverse IP Search with DomainTools; Recipe 5-7: Initiating Zone Transfers with dig; Recipe 5-8: Brute-forcing Subdomains with dnsmap 327 $aRecipe 5-9: Mapping IP Addresses to ASNs via Shadowserver 330 $aA computer forensics ""how-to"" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.Security professionals face a constant battle 606 $aMalware (Computer software) 615 0$aMalware (Computer software) 676 $a005.8 676 $a005.84 700 $aLigh$b Michael W$01481325 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910785237703321 996 $aMalware analyst's cookbook and dvd$93698205 997 $aUNINA