000 | 02034cam a2200385 i 4500 | ||
---|---|---|---|
001 | 18684305 | ||
003 | OSt | ||
005 | 20220628150148.0 | ||
008 | 150702t20152015inua 001 0 eng d | ||
010 | _a 2015945503 | ||
020 |
_a9781119028758 _qpaperback |
||
035 | _a(OCoLC)ocn900793411 | ||
040 |
_aBTCTA _beng _cBTCTA _erda _dBDX _dYDXCP _dCDX _dIAD _dOCLCO _dFM0 _dUMS _dOCLCF _dCDN _dDLC _dUOC |
||
042 | _alccopycat | ||
082 | 0 | 0 |
_a005.84 _223 _bJOX |
100 | 1 |
_aKoret, Joxean _eauthor. _9839 |
|
245 | 1 | 4 |
_aThe antivirus hacker's handbook / _cJoxean Koret, Elias Bachaalany. |
264 | 1 |
_aIndianapolis, IN : _bJohn Wiley & Sons Inc., _c[2015]. |
|
264 | 4 | _c©2015 by John Wiley & Sons Inc. | |
300 |
_axxii, 359 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes index. | ||
505 | 0 | _aAntivirus basics -- Introduction to antivirus software -- Revere-engineering the core -- The plug-ins system -- Understanding antivirus signatures -- The update system -- Antivirus software evasion -- Evading signatures -- Evading scanners -- Evading heuristic engines -- Identifying the attack surface -- Denial of service -- Analysis and exploitation -- Static analysis -- Dynamic analysis -- Local exploitation -- Remote exploitation -- Current trends and recommendations -- Current trends in antivirus protection -- Recommendations and the possible future. | |
520 | _a"The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight."-- Back cover. | ||
650 | 0 |
_aComputer viruses. _93215 |
|
650 | 0 |
_aHackers. _9135 |
|
650 | 0 |
_aComputer security. _93167 |
|
700 | 1 |
_aBachaalany, Elias _eauthor. _9840 |
|
906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
999 |
_c256 _d256 |