{
"item_title" : "Reversing Data Structures and Algorithms in Malware",
"item_author" : [" Jason Reaves "],
"item_description" : "Walk through a number of real world examples for reverse engineering data structures and algorithms found in malware in order to gradually introduce the reader to more advanced examples culminating in reverse engineering a C2 (Command and Control) protocol.",
"item_img_path" : "https://covers3.booksamillion.com/covers/bam/9/79/864/644/9798646442674_b.jpg",
"price_data" : {
"retail_price" : "40.00", "online_price" : "40.00", "our_price" : "40.00", "club_price" : "40.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : ""
}
}
Overview
Walk through a number of real world examples for reverse engineering data structures and algorithms found in malware in order to gradually introduce the reader to more advanced examples culminating in reverse engineering a C2 (Command and Control) protocol.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9798646442674
- ISBN-10: 9798646442674
- Publisher: Independently Published
- Publish Date: May 2020
- Dimensions: 9.02 x 5.98 x 0.18 inches
- Shipping Weight: 0.27 pounds
- Page Count: 74
Related Categories
