top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The IDA pro book [[electronic resource] ] : the unofficial guide to the world's most popular disassembler / / Chris Eagle
The IDA pro book [[electronic resource] ] : the unofficial guide to the world's most popular disassembler / / Chris Eagle
Autore Eagle Chris
Edizione [2nd ed.]
Pubbl/distr/stampa San Francisco, : No Starch Press, 2011
Descrizione fisica 1 online resource (954 p.)
Disciplina 004.2/4
004.24
005.14
Soggetto topico Disassemblers (Computer programs)
Debugging in computer science
ISBN 1-59327-395-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The IDA Pro Book; PRAISE FOR THE FIRST EDITION OF THE IDA PRO BOOK; Acknowledgments; Introduction; I. Introduction to IDA; 1. Introduction to Disassembly; Disassembly Theory; The What of Disassembly; The Why of Disassembly; Malware Analysis; Vulnerability Analysis; Software Interoperability; Compiler Validation; Debugging Displays; The How of Disassembly; A Basic Disassembly Algorithm; Linear Sweep Disassembly; Recursive Descent Disassembly; Sequential Flow Instructions; Conditional Branching Instructions; Unconditional Branching Instructions; Function Call Instructions; Return Instructions
Summary2. Reversing and Disassembly Tools; Classification Tools; file; PE Tools; PEiD; Summary Tools; nm; ldd; objdump; otool; dumpbin; c++filt; Deep Inspection Tools; strings; Disassemblers; Summary; 3. IDA Pro Background; Hex-Rays' Stance on Piracy; Obtaining IDA Pro; IDA Versions; IDA Licenses; Purchasing IDA; Upgrading IDA; IDA Support Resources; Your IDA Installation; Windows Installation; OS X and Linux Installation; IDA and SELinux; 32-bit vs. 64-bit IDA; The IDA Directory Layout; Thoughts on IDA's User Interface; Summary; II. Basic IDA Usage; 4. Getting Started with IDA; Launching IDA
IDA File LoadingUsing the Binary File Loader; IDA Database Files; IDA Database Creation; Closing IDA Databases; Reopening a Database; Introduction to the IDA Desktop; Desktop Behavior During Initial Analysis; IDA Desktop Tips and Tricks; Reporting Bugs; Summary; 5. IDA Data Displays; The Principal IDA Displays; The Disassembly Window; IDA Graph View; IDA Text View; The Functions Window; The Output Window; Secondary IDA Displays; The Hex View Window; The Exports Window; The Imports Window; The Structures Window; The Enums Window; Tertiary IDA Displays; The Strings Window; The Names Window
The Segments WindowThe Signatures Window; The Type Libraries Window; The Function Calls Window; The Problems Window; Summary; 6. Disassembly Navigation; Basic IDA Navigation; Double-Click Navigation; Jump to Address; Navigation History; Stack Frames; Calling Conventions; The C Calling Convention; The Standard Calling Convention; The fastcall Convention for x86; C++ Calling Conventions; Other Calling Conventions; Local Variable Layout; Stack Frame Examples; IDA Stack Views; Searching the Database; Text Searches; Binary Searches; Summary; 7. Disassembly Manipulation; Names and Naming
Parameters and Local VariablesNamed Locations; Register Names; Commenting in IDA; Regular Comments; Repeatable Comments; Anterior and Posterior Lines; Function Comments; Basic Code Transformations; Code Display Options; Formatting Instruction Operands; Manipulating Functions; Creating New Functions; Deleting Functions; Function Chunks; Function Attributes; Stack Pointer Adjustments; Converting Data to Code (and Vice Versa); Basic Data Transformations; Specifying Data Sizes; Working with Strings; Specifying Arrays; Summary; 8. Datatypes and Data Structures; Recognizing Data Structure Use
Array Member Access
Record Nr. UNINA-9910818485303321
Eagle Chris  
San Francisco, : No Starch Press, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Open source fuzzing tools [[electronic resource] /] / Gadi Evron ... [et al.]
Open source fuzzing tools [[electronic resource] /] / Gadi Evron ... [et al.]
Edizione [1st edition]
Pubbl/distr/stampa Burlington, MA, : Syngress Pub., c2007
Descrizione fisica 1 online resource (209 p.)
Disciplina 005.14
005.8
Altri autori (Persone) EvronGadi
Soggetto topico Computer software - Testing
Open source software
Debugging in computer science
Soggetto genere / forma Electronic books.
ISBN 1-281-14515-7
9786611145156
0-08-055561-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Open Source Fuzzing Tools; Copyright Page; Contributing Authors; Contents; Chapter 1: Introduction to Vulnerability Research; Statement of Scope; Off-by-One Errors; Programming Language Use Errors; Integer Overflows; Bugs and Vulnerabilities; The Vaunted Buffer Overflow; Finding Bugs and Vulnerabilities; Source Code Review; Black Box Testing; Glass Box Testing; Chapter 2: Fuzzing-What's That?; Introduction; Introduction to Fuzzing; Milestones in Fuzzing; Fuzzing Technology; Traffic Sniffing; Prepared Template; Second-Generation Fuzzing; File Fuzzing; Host-side Monitoring
Vulnerability Scanners as Fuzzers Uses of Fuzzing; Open Source Fuzzers; Commercial-Grade Fuzzers; What Comes Next; The Software Development Life Cycle; Chapter 3: Building a Fuzzing Environment; Introduction; Knowing What to Ask...; Basic Tools and Setup; Data Points; Crash Dumps; Fuzzer Output; Debuggers; Recon Tools; Linux; OSX; Summary; Chapter 4: Open Source Fuzzing Tools; Introduction; Frameworks; Special-Purpose Tools; General-Purpose Tools; Chapter 5: Commercial Fuzzing Solutions; Introduction; beSTORM (by Beyond Security); BPS-1000 (by BreakingPoint Systems); Codenomicon
Mu-4000 Security Analyzer (by Mu Security)Chapter 6: Build Your Own Fuzzer; Hold Your Horses; Fuzzer Building Blocks; One or More Valid Data Sets; Understanding What Each Bytein the Data Set Means; Change the Values of the Data Sets While Maintaining the Integrity of the Data Being Sent; Recreate the Same Malformed DataSet Time and Time Again; An Arsenal of Malformed Values, or the Ability to Create a Variety of Malformed Outputs; Maintain a Form of a State Machine; Summarize; Down to Business; Simplest Fuzz Testing Find Issues; Chapter 7: Integration of Fuzzing in the Development Cycle
Introduction Why Is Fuzzing Important to Include in a Software Development Cycle?; Security Testing Workload; Setting Expectations for Fuzzers in a Software Development Lifecycle; Fuzzing as a Panacea; Fuzzing Tools versus ...; Setting the Plan for Implementing Fuzzers into a Software Development Lifecycle; Setting Goals; Building and Executing on the Plan; Understanding How to Increase Effectiveness of Fuzzers, and Avoiding Any Big Gotchas; Hidden Costs; Finding More Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Standardization and Certification
Fuzzing and the Corporate Environment Software Security Testing, the Challenges; Testing for Security; Fuzzing as a Viable Option; Business Pressure; Software Security Certification; Meeting Standards and Compliance; Tester Certification; Industry Pressure; Antivirus Product Testing and Certification; Chapter 9: What Is a File?; Introduction; Are File Fuzzers Special?; Analyzing and Building Files; Textual Files; Binary Files; Running the Test; Monitoring the Application with the Test Cases; Chapter 10: Code Coverage and Fuzzing; Introduction; Code Coverage; Obtaining Code Coverage
Instrumenting the Binary
Record Nr. UNINA-9910458833603321
Burlington, MA, : Syngress Pub., c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Open source fuzzing tools [[electronic resource] /] / Gadi Evron ... [et al.]
Open source fuzzing tools [[electronic resource] /] / Gadi Evron ... [et al.]
Edizione [1st edition]
Pubbl/distr/stampa Burlington, MA, : Syngress Pub., c2007
Descrizione fisica 1 online resource (209 p.)
Disciplina 005.14
005.8
Altri autori (Persone) EvronGadi
Soggetto topico Computer software - Testing
Open source software
Debugging in computer science
ISBN 1-281-14515-7
9786611145156
0-08-055561-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Open Source Fuzzing Tools; Copyright Page; Contributing Authors; Contents; Chapter 1: Introduction to Vulnerability Research; Statement of Scope; Off-by-One Errors; Programming Language Use Errors; Integer Overflows; Bugs and Vulnerabilities; The Vaunted Buffer Overflow; Finding Bugs and Vulnerabilities; Source Code Review; Black Box Testing; Glass Box Testing; Chapter 2: Fuzzing-What's That?; Introduction; Introduction to Fuzzing; Milestones in Fuzzing; Fuzzing Technology; Traffic Sniffing; Prepared Template; Second-Generation Fuzzing; File Fuzzing; Host-side Monitoring
Vulnerability Scanners as Fuzzers Uses of Fuzzing; Open Source Fuzzers; Commercial-Grade Fuzzers; What Comes Next; The Software Development Life Cycle; Chapter 3: Building a Fuzzing Environment; Introduction; Knowing What to Ask...; Basic Tools and Setup; Data Points; Crash Dumps; Fuzzer Output; Debuggers; Recon Tools; Linux; OSX; Summary; Chapter 4: Open Source Fuzzing Tools; Introduction; Frameworks; Special-Purpose Tools; General-Purpose Tools; Chapter 5: Commercial Fuzzing Solutions; Introduction; beSTORM (by Beyond Security); BPS-1000 (by BreakingPoint Systems); Codenomicon
Mu-4000 Security Analyzer (by Mu Security)Chapter 6: Build Your Own Fuzzer; Hold Your Horses; Fuzzer Building Blocks; One or More Valid Data Sets; Understanding What Each Bytein the Data Set Means; Change the Values of the Data Sets While Maintaining the Integrity of the Data Being Sent; Recreate the Same Malformed DataSet Time and Time Again; An Arsenal of Malformed Values, or the Ability to Create a Variety of Malformed Outputs; Maintain a Form of a State Machine; Summarize; Down to Business; Simplest Fuzz Testing Find Issues; Chapter 7: Integration of Fuzzing in the Development Cycle
Introduction Why Is Fuzzing Important to Include in a Software Development Cycle?; Security Testing Workload; Setting Expectations for Fuzzers in a Software Development Lifecycle; Fuzzing as a Panacea; Fuzzing Tools versus ...; Setting the Plan for Implementing Fuzzers into a Software Development Lifecycle; Setting Goals; Building and Executing on the Plan; Understanding How to Increase Effectiveness of Fuzzers, and Avoiding Any Big Gotchas; Hidden Costs; Finding More Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Standardization and Certification
Fuzzing and the Corporate Environment Software Security Testing, the Challenges; Testing for Security; Fuzzing as a Viable Option; Business Pressure; Software Security Certification; Meeting Standards and Compliance; Tester Certification; Industry Pressure; Antivirus Product Testing and Certification; Chapter 9: What Is a File?; Introduction; Are File Fuzzers Special?; Analyzing and Building Files; Textual Files; Binary Files; Running the Test; Monitoring the Application with the Test Cases; Chapter 10: Code Coverage and Fuzzing; Introduction; Code Coverage; Obtaining Code Coverage
Instrumenting the Binary
Record Nr. UNINA-9910784616803321
Burlington, MA, : Syngress Pub., c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Open source fuzzing tools [[electronic resource] /] / Gadi Evron ... [et al.]
Open source fuzzing tools [[electronic resource] /] / Gadi Evron ... [et al.]
Edizione [1st edition]
Pubbl/distr/stampa Burlington, MA, : Syngress Pub., c2007
Descrizione fisica 1 online resource (209 p.)
Disciplina 005.14
005.8
Altri autori (Persone) EvronGadi
Soggetto topico Computer software - Testing
Open source software
Debugging in computer science
ISBN 1-281-14515-7
9786611145156
0-08-055561-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Open Source Fuzzing Tools; Copyright Page; Contributing Authors; Contents; Chapter 1: Introduction to Vulnerability Research; Statement of Scope; Off-by-One Errors; Programming Language Use Errors; Integer Overflows; Bugs and Vulnerabilities; The Vaunted Buffer Overflow; Finding Bugs and Vulnerabilities; Source Code Review; Black Box Testing; Glass Box Testing; Chapter 2: Fuzzing-What's That?; Introduction; Introduction to Fuzzing; Milestones in Fuzzing; Fuzzing Technology; Traffic Sniffing; Prepared Template; Second-Generation Fuzzing; File Fuzzing; Host-side Monitoring
Vulnerability Scanners as Fuzzers Uses of Fuzzing; Open Source Fuzzers; Commercial-Grade Fuzzers; What Comes Next; The Software Development Life Cycle; Chapter 3: Building a Fuzzing Environment; Introduction; Knowing What to Ask...; Basic Tools and Setup; Data Points; Crash Dumps; Fuzzer Output; Debuggers; Recon Tools; Linux; OSX; Summary; Chapter 4: Open Source Fuzzing Tools; Introduction; Frameworks; Special-Purpose Tools; General-Purpose Tools; Chapter 5: Commercial Fuzzing Solutions; Introduction; beSTORM (by Beyond Security); BPS-1000 (by BreakingPoint Systems); Codenomicon
Mu-4000 Security Analyzer (by Mu Security)Chapter 6: Build Your Own Fuzzer; Hold Your Horses; Fuzzer Building Blocks; One or More Valid Data Sets; Understanding What Each Bytein the Data Set Means; Change the Values of the Data Sets While Maintaining the Integrity of the Data Being Sent; Recreate the Same Malformed DataSet Time and Time Again; An Arsenal of Malformed Values, or the Ability to Create a Variety of Malformed Outputs; Maintain a Form of a State Machine; Summarize; Down to Business; Simplest Fuzz Testing Find Issues; Chapter 7: Integration of Fuzzing in the Development Cycle
Introduction Why Is Fuzzing Important to Include in a Software Development Cycle?; Security Testing Workload; Setting Expectations for Fuzzers in a Software Development Lifecycle; Fuzzing as a Panacea; Fuzzing Tools versus ...; Setting the Plan for Implementing Fuzzers into a Software Development Lifecycle; Setting Goals; Building and Executing on the Plan; Understanding How to Increase Effectiveness of Fuzzers, and Avoiding Any Big Gotchas; Hidden Costs; Finding More Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Standardization and Certification
Fuzzing and the Corporate Environment Software Security Testing, the Challenges; Testing for Security; Fuzzing as a Viable Option; Business Pressure; Software Security Certification; Meeting Standards and Compliance; Tester Certification; Industry Pressure; Antivirus Product Testing and Certification; Chapter 9: What Is a File?; Introduction; Are File Fuzzers Special?; Analyzing and Building Files; Textual Files; Binary Files; Running the Test; Monitoring the Application with the Test Cases; Chapter 10: Code Coverage and Fuzzing; Introduction; Code Coverage; Obtaining Code Coverage
Instrumenting the Binary
Record Nr. UNINA-9910812476703321
Burlington, MA, : Syngress Pub., c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Practical Debugging at Scale : Cloud Native Debugging in Kubernetes and Production / / Shai Almog
Practical Debugging at Scale : Cloud Native Debugging in Kubernetes and Production / / Shai Almog
Autore Almog Shai
Edizione [First edition.]
Pubbl/distr/stampa New York, NY : , : Apress Media LLC, , [2023]
Descrizione fisica 1 online resource
Disciplina 005.3
Soggetto topico Application software - Development
Cloud computing
Debugging in computer science
ISBN 1-4842-9042-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Part I. Basics -- 1. Know Your Debugger -- 2. The Checklist -- 3. The Auxiliary Tools -- 4. Logging, Testing, and Fail Fast -- 5. Time Travel Debugging -- Part II. The Modern Production Environment -- 6. Debugging Kubernetes -- 7. Serverless Debugging -- 8. Fullstack Debugging -- 9. Observability and Monitoring -- 10. Developer Observability -- -- Part III. In Practice -- 11. Tools of Learning -- 12. Performance and Memory -- 13. Security -- 14. Bug Strategies -- Appendix A: References.
Record Nr. UNINA-9910637733503321
Almog Shai  
New York, NY : , : Apress Media LLC, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Practical malware analysis [[electronic resource] ] : the hands-on guide to dissecting malicious software / / by Michael Sikorski and Andrew Honig
Practical malware analysis [[electronic resource] ] : the hands-on guide to dissecting malicious software / / by Michael Sikorski and Andrew Honig
Autore Sikorski Michael
Pubbl/distr/stampa San Francisco, : No Starch Press, c2012
Descrizione fisica XXXI, 766 p.; ; 24 cm
Disciplina 005.8/4
Altri autori (Persone) HonigAndrew
Soggetto topico Malware (Computer software)
Computer viruses
Debugging in computer science
Computer security
Soggetto genere / forma Electronic books.
ISBN 9781593274306
9781593272906
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Basic analysis -- pt. 2. Advanced static analysis -- pt. 3. Advanced dynamic analysis -- pt. 4. Malware functionality -- pt. 5. Anti-reverse-engineering -- pt. 6. Special topics.
Record Nr. UNINA-9910141304103321
Sikorski Michael  
San Francisco, : No Starch Press, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Practical malware analysis : the hands-on guide to dissecting malicious software / / by Michael Sikorski and Andrew Honig
Practical malware analysis : the hands-on guide to dissecting malicious software / / by Michael Sikorski and Andrew Honig
Autore Sikorski Michael
Pubbl/distr/stampa San Francisco, : No Starch Press, c2012
Descrizione fisica XXXI, 766 p.; ; 24 cm
Disciplina 005.8/4
Altri autori (Persone) HonigAndrew
Soggetto topico Malware (Computer software)
Computer viruses
Debugging in computer science
Computer security
ISBN 1-59327-430-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Basic analysis -- pt. 2. Advanced static analysis -- pt. 3. Advanced dynamic analysis -- pt. 4. Malware functionality -- pt. 5. Anti-reverse-engineering -- pt. 6. Special topics.
Record Nr. UNINA-9910790145203321
Sikorski Michael  
San Francisco, : No Starch Press, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Practical malware analysis : the hands-on guide to dissecting malicious software / / by Michael Sikorski and Andrew Honig
Practical malware analysis : the hands-on guide to dissecting malicious software / / by Michael Sikorski and Andrew Honig
Autore Sikorski Michael
Pubbl/distr/stampa San Francisco, : No Starch Press, c2012
Descrizione fisica XXXI, 766 p.; ; 24 cm
Disciplina 005.8/4
Altri autori (Persone) HonigAndrew
Soggetto topico Malware (Computer software)
Computer viruses
Debugging in computer science
Computer security
ISBN 1-59327-430-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Basic analysis -- pt. 2. Advanced static analysis -- pt. 3. Advanced dynamic analysis -- pt. 4. Malware functionality -- pt. 5. Anti-reverse-engineering -- pt. 6. Special topics.
Record Nr. UNINA-9910817360103321
Sikorski Michael  
San Francisco, : No Starch Press, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Problem determination across multiple WebSphere products AIX Platform [[electronic resource] /] / Peter Kovari ... [et al.]
Problem determination across multiple WebSphere products AIX Platform [[electronic resource] /] / Peter Kovari ... [et al.]
Edizione [1st ed.]
Pubbl/distr/stampa Armonk, N.Y., : IBM, 2004
Descrizione fisica 386 p. : ill
Disciplina 005.376
Collana Redbooks
Soggetto topico Debugging in computer science
Web servers - Computer programs
Web site development
Application software - Development
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910450114803321
Armonk, N.Y., : IBM, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Problem determination across multiple WebSphere products AIX Platform [[electronic resource] /] / Peter Kovari ... [et al.]
Problem determination across multiple WebSphere products AIX Platform [[electronic resource] /] / Peter Kovari ... [et al.]
Edizione [1st ed.]
Pubbl/distr/stampa Armonk, N.Y., : IBM, 2004
Descrizione fisica 386 p. : ill
Disciplina 005.376
Collana Redbooks
Soggetto topico Debugging in computer science
Web servers - Computer programs
Web site development
Application software - Development
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783102903321
Armonk, N.Y., : IBM, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui