Android malware and analysis / (Record no. 48739)

MARC details
000 -LEADER
fixed length control field 02029cmm a2200349 a 4500
001 - CONTROL NUMBER
control field 46729
003 - CONTROL NUMBER IDENTIFIER
control field IN-BdCUP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230426175554.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230426s2023 u eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781482252200
040 ## - CATALOGING SOURCE
Language of cataloging eng
Transcribing agency IN-BdCUP
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.840
Item number D917
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Dunham, Ken
245 #0 - TITLE STATEMENT
Title Android malware and analysis /
Statement of responsibility, etc. Ken Dunham, Shane Hartman, Jose Andre Morales, Manu Quintans, Tim Strazzere
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. Taylor & Francis,
Date of publication, distribution, etc. [2015];©2015
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
503 ## - BIBLIOGRAPHIC HISTORY NOTE (BK CF MU) [OBSOLETE]
Bibliographic history note An Auerbach book
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note chapter 1. Introduction to the Android operating system and threats -- chapter 2. Malware threats, hoaxes, and taxonomy -- chapter 3. Open source tools -- chapter 4. Static analysis -- chapter 5. Android malware evolution -- chapter 6. Android malware trends and reversing tactics -- chapter 7. Behavioral analysis -- chapter 8. Building your own sandbox -- chapter 9. Case study examples
520 ## - SUMMARY, ETC.
Summary, etc. There has long been a need for a book that covers the tools and tactics for identifying and analyzing Android threats. Ken Dunham, renowned global malware expert, and leading international experts team up to document the best tools and tactics for analyzing Android malware. Many tools exist in the open source market today but do not work as advertised and frequently include failed installations and extensive dependencies for proper installation. The book includes online access to a library of tools that provide readers with what they need to begin the analysis of malware threats right away
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Operating systems (computers)
Topical term or geographic name entry element Mobile computing
Topical term or geographic name entry element Smartphones
Topical term or geographic name entry element Android (Electronic resource)
Topical term or geographic name entry element Malware (Computer software)
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Hartman, Shane
Personal name Morales, Jose Andre
Personal name Quintans, Manu
Personal name Strazzere, Tim
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Electronic Book Resource
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781482252200">https://www.taylorfrancis.com/books/9781482252200</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type E-Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Uniform resource identifier Bill Date Koha item type
    Dewey Decimal Classification     Ranganathan Library Ranganathan Library 07/04/2022 Taylor & Francis   005.840 D917 E01333 26/04/2023 https://www.taylorfrancis.com/books/9781482252200 07/04/2022 E-Book
This system is made operational by the in-house staff of the CUP Library.