23,99 €
inkl. MwSt.

Versandfertig in 6-10 Tagen
payback
12 °P sammeln
  • Broschiertes Buch

Today with the tremendous series of undocumented or poorly documented protocols how an incident responder on the network can can present the packet by capturing a binary executable file. The contents of such files can be parsed by conventional static and dynamic techniques. In many situations one can t detect even the binary file for analysis. So a new process of Protocol Reverse Engineering (PRE) leveraging multiple sources of information to accelerate incident response detection. It is a pseudo-formal survey of the tools, techniques, and methodologies that I've experienced or observed to be…mehr

Produktbeschreibung
Today with the tremendous series of undocumented or poorly documented protocols how an incident responder on the network can can present the packet by capturing a binary executable file. The contents of such files can be parsed by conventional static and dynamic techniques. In many situations one can t detect even the binary file for analysis. So a new process of Protocol Reverse Engineering (PRE) leveraging multiple sources of information to accelerate incident response detection. It is a pseudo-formal survey of the tools, techniques, and methodologies that I've experienced or observed to be effective that is deliberately proscriptive, rather than prescriptive. It is not an exhaustive study, and only designed to cover common needs of analysts - particularly engaged in incident response.
Autorenporträt
Mr. Hemant Kumar Saini is a RHCE. He has completed M.Tech in Computer Science & Engineering from MITRC running under Rajasthan Technical University in 2014 and Mr. Satpal Singh Kushwaha is an Assistant Professor at MITRC, Alwar. They are the author of several articles published in reputed Journals and international Conferences.