| 000 | 00917nam a2200289Ia 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20220912145013.0 | ||
| 006 | a|||||r|||| 00| 0 | ||
| 007 | ta | ||
| 008 | 220909b |||||||| |||| 00| 0 eng d | ||
| 020 | _a9780387098241 (hbd) | ||
| 024 | _a86326 | ||
| 037 | _b808, 09/11/2009, Ashutosh Technical Books | ||
| 037 | _cTextbook | ||
| 040 |
_aCSL _beng _cCSL |
||
| 041 | _aeng | ||
| 082 | _aD65,8(B):(894), P9 TD | ||
| 100 | _aAbhishek Singh Ed. | ||
| 245 | 0 | _aIndentifying malicious code through reverse engineering | |
| 260 |
_aNew York _bSpringer _c2009 |
||
| 300 |
_ax, 188p. _ccm. |
||
| 490 | _aAdvances in information security | ||
| 500 | _aAppendix 168- 186p.; Index 187- 188p. | ||
| 650 | _aComputer Science | ||
| 942 |
_hD65,8(B):(894), P9 TD _cTB _2CC |
||
| 999 |
_c20660 _d20660 |
||