Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Amphibious Operations: The Operational Response to a Third World Crisis, Birrer Bobby, Driest Charles W.


Варианты приобретения
Цена: 10658.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-23
Ориентировочная дата поставки: конец Сентября - начало Октября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Birrer Bobby, Driest Charles W.
Название:  Amphibious Operations: The Operational Response to a Third World Crisis
ISBN: 9781249457985
Издательство: Biblioscholar
Классификация:
ISBN-10: 124945798X
Обложка/Формат: Paperback
Страницы: 60
Вес: 0.13 кг.
Дата издания: 21.09.2012
Язык: English
Иллюстрации: Black & white illustrations
Размер: 246 x 189 x 3
Читательская аудитория: General (us: trade)
Подзаголовок: The operational response to a third world crisis
Рейтинг:
Поставляется из: США


Metamorphic Program Fragmentation as a Software Protection

Автор: Birrer Bobby
Название: Metamorphic Program Fragmentation as a Software Protection
ISBN: 1249450527 ISBN-13(EAN): 9781249450528
Издательство: Неизвестно
Рейтинг:
Цена: 10658.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Unauthorized reverse-engineering of programs and algorithms is a major problem for the software industry. Every program released to the public can be analyzed by any number of malicious reverse-engineers. These reversers search for security holes in the program to exploit or try to steal a competitor's vital algorithms. While it can take years and millions of dollars worth of research to develop new software, a determined reverser can reverse-engineer the program in a fraction of the time. To discourage reverse-engineering attempts, developers use a variety of software prote tions to obfuscate their programs. However, these protections are generally static, allowing reverse-engineers to eventually adapt to the protections, defeat them, and sometimes build automated tools to defeat them in the future. Metamorphic software protections add another layer of protection to traditional static obfuscation techniques. Metamorphic protections force a reverser to adjust their attacks as the protection changes. Program fragmentation combines two obfuscation techniques, outlining and obfuscated jump tables, into a new, metamorphic protection. Sections of code are removed from the main program flow and randomly placed throughout memory, reducing the programs locality. These fragments move while the program is running and are called using obfuscated jump tables, making program execution difficult to follow. This research assesses the performance overhead of a program fragmentation metamorphic engine and provides a qualitative analysis of its effectiveness against reverse-engineering techniques. Program fragmentation has very little associated overhead, with execution times for individual fragments of less than one microsecond. This low overhead allow a large numbers of fragments to be inserted into programs for protection. In addition, program fragmentation is an effective technique to complicate program of programs using two common disassembler/debugger tools. Thus,
program fra

Combined Action Platoons: A Possible Role in the Low-Intensity Conflict Environment

Автор: Driest Charles W.
Название: Combined Action Platoons: A Possible Role in the Low-Intensity Conflict Environment
ISBN: 1249911311 ISBN-13(EAN): 9781249911319
Издательство: Неизвестно
Рейтинг:
Цена: 10658.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Developing a Gualia-Based Multi-Agent Architecture for Use in Malware Detection

Автор: Birrer Bobby D.
Название: Developing a Gualia-Based Multi-Agent Architecture for Use in Malware Detection
ISBN: 1249588170 ISBN-13(EAN): 9781249588177
Издательство: Неизвестно
Рейтинг:
Цена: 10658.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия