LEADER 03235nam 2200661 450 001 9910480651303321 005 20180613001306.0 010 $a1-4704-0434-6 035 $a(CKB)3360000000465017 035 $a(EBL)3114156 035 $a(SSID)ssj0000973884 035 $a(PQKBManifestationID)11533032 035 $a(PQKBTitleCode)TC0000973884 035 $a(PQKBWorkID)10984709 035 $a(PQKB)10029123 035 $a(MiAaPQ)EBC3114156 035 $a(PPN)195417216 035 $a(EXLCZ)993360000000465017 100 $a20050324h20052005 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aRigidity theorems for actions of product groups and countable Borel equivalence relations /$fGreg Hjorth, Alexander S. Kechris 210 1$aProvidence, Rhode Island :$cAmerican Mathematical Society,$d[2005] 210 4$dİ2005 215 $a1 online resource (126 p.) 225 1 $aMemoirs of the American Mathematical Society,$x0065-9266 ;$vnumber 833 300 $a"Volume 176, number 833 (first of 4 numbers)." 311 $a0-8218-3771-0 320 $aIncludes bibliographical references (pages 107-109). 327 $a""Contents""; ""Introduction""; ""Chapter 0. Preliminaries""; ""0A. Actions""; ""0B. Equivalence relations""; ""0C. Borel notions""; ""0D. Measures""; ""0E. Borel actions and measures""; ""0F. Amenability""; ""Chapter 1. Actions of Free Groups and Treeable Equivalence Relations""; ""Chapter 2. A Cocycle Reduction Result""; ""Chapter 3. Some Applications""; ""3A. An ""elementary"" proof of existence of incomparables""; ""3B. Further ""elementary"" proofs of theorems of Adamsa???Kechris""; ""3C. ""Elementary"" proofs of results of Adams and Thomas"" 327 $a""3D. Relative ergodicity and rigidity results for product group actions""""Chapter 4. Factoring Homomorphisms""; ""Chapter 5. Further Applications""; ""5A. Rigidity results for reducibility and stable orbit equivalence""; ""5B. Products of hyperbolic groups""; ""Chapter 6. Product Actions, I""; ""Chapter 7. Product Actions, II""; ""Chapter 8. A Final Application""; ""Appendix A: Strong Notions of Ergodicity""; ""A1. Homomorphisms and relative ergodicity""; ""A2. E[sub(0)]a???ergodicity and almost invariant sets""; ""A3. Almost invariant vectors"" 327 $a""E1. Amenable classes of structures""""E2. The factoring lemma""; ""Bibliography"" 410 0$aMemoirs of the American Mathematical Society ;$vno. 833. 606 $aSet theory 606 $aBorel sets 606 $aMeasure theory 606 $aErgodic theory 606 $aRigidity (Geometry) 608 $aElectronic books. 615 0$aSet theory. 615 0$aBorel sets. 615 0$aMeasure theory. 615 0$aErgodic theory. 615 0$aRigidity (Geometry) 676 $a510 s 676 $a511.3/22 700 $aHjorth$b Greg$f1963-$067025 702 $aKechris$b A. S.$f1946- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910480651303321 996 $aRigidity theorems for actions of product groups and countable Borel equivalence relations$92271248 997 $aUNINA LEADER 02262nam 2200505 a 450 001 9910790145203321 005 20231113151011.0 010 $a1-59327-430-0 035 $a(Au-PeEL)EBL6095762 035 $a(OCoLC)1156147137 035 $a(CaSebORM)9781593272906 035 $a(MiAaPQ)EBC1137570 035 $a(MiAaPQ)EBC6095762 035 $a(EXLCZ)992670000000173740 100 $a20120210d2012 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPractical malware analysis $ethe hands-on guide to dissecting malicious software /$fby Michael Sikorski and Andrew Honig 210 $aSan Francisco $cNo Starch Press$dc2012 215 $aXXXI, 766 p.;$d24 cm 300 $aIncludes index. 311 $a9781593272906 327 $apt. 1. Basic analysis -- pt. 2. Advanced static analysis -- pt. 3. Advanced dynamic analysis -- pt. 4. Malware functionality -- pt. 5. Anti-reverse-engineering -- pt. 6. Special topics. 330 $aThere are more than 100 malicious computer attacks every second, resulting in tens of billions of dollars in economic damages each year. Among security professionals, the skills required to quickly analyze and assess these attacks are in high demand. Practical Malware Analysis provides a rapid introduction to the tools and methods used to dissect malicious software (malware), showing readers how to discover, debug, and disassemble these threats. The book goes on to examine how to overcome the evasive techniques?stealth, code obfuscation, encryption, file packing, and others?that malware author 606 $aMalware (Computer software) 606 $aComputer viruses 606 $aDebugging in computer science 606 $aComputer security 615 0$aMalware (Computer software) 615 0$aComputer viruses. 615 0$aDebugging in computer science. 615 0$aComputer security. 676 $a005.8/4 700 $aSikorski$b Michael$01479356 701 $aHonig$b Andrew$01479357 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910790145203321 996 $aPractical malware analysis$93695439 997 $aUNINA