MARC details
| 000 -LEADER |
| fixed length control field |
02488nam a2200373 i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250919010449.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
151210t20052005inua f 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0764574817 |
| Qualifying information |
paperback |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780764574818 |
| Qualifying information |
paperback |
| Terms of availability |
Hadiah |
| 039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
| Level of rules in bibliographic description |
201601141457 |
| Level of effort used to assign nonsubject heading access points |
rosli |
| y |
12-10-2015 |
| z |
zabidah |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
HF9 |
| Language of cataloging |
eng |
| Transcribing agency |
HF9 |
| Modifying agency |
IXA |
| -- |
JRZ |
| -- |
OCL |
| -- |
DLC |
| -- |
XL4 |
| -- |
VRC |
| -- |
UKM |
| -- |
BAKER |
| -- |
LVB |
| -- |
YDXCP |
| -- |
BTCTA |
| -- |
HVC |
| -- |
DEBBG |
| -- |
OCL |
| -- |
DEBSZ |
| -- |
FNP |
| -- |
OCLCO |
| -- |
SGB |
| -- |
OCLCF |
| -- |
OCLCQ |
| -- |
WAU |
| -- |
OVY |
| -- |
UKM |
| Description conventions |
rda |
| 090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
| Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
QA76.758.E385 |
| 090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
| Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
QA76.758 |
| Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
.E385 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Eilam, Eldad, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Reversing : |
| Remainder of title |
secrets of reverse engineering / |
| Statement of responsibility, etc. |
Eldad Eilam. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Indianapolis, IN : |
| Name of producer, publisher, distributor, manufacturer |
Wiley, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2005. |
| 264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Date of production, publication, distribution, manufacture, or copyright notice |
©2005 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxxviii, 595 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Source |
rdacarrier |
| 500 ## - GENERAL NOTE |
| General note |
Includes index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. This is the first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products. It helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware. The book offers a primer on advanced reverse-engineering, delving into'disassembly,' code-level reverse engineering, and explains how to decipher assembly language. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Software engineering. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Reverse engineering. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) |
| a |
.b1624283x |
| b |
2019-11-12 |
| c |
2019-11-12 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
AM |
| Suppress in OPAC |
No |
| Call number prefix |
QA76.758.E385 |
| 914 ## - VTLS Number |
| VTLS Number |
vtls003597152 |
| 990 ## - EQUIVALENCES OR CROSS-REFERENCES [LOCAL, CANADA] |
| Link information for 9XX fields |
rk4 |
| 991 ## - LOCAL NOTE (NAMA FAKULTI/INSTITUT/PUSAT) |
| a |
Fakulti Sains dan Teknologi |
| 998 ## - LOCAL CONTROL INFORMATION (RLIN) |
| Library |
PERPUSTAKAAN TUN SERI LANANG |
| Operator's initials, OID (RLIN) |
2015-10-12 |
| Cataloger's initials, CIN (RLIN) |
m |
| Material Type (Sierra) |
Printed Books |
| Language |
English |
| Country |
|
| -- |
0 |
| -- |
.b1624283x |