000 02034cam a2200385 i 4500
001 18684305
003 OSt
005 20220628150148.0
008 150702t20152015inua 001 0 eng d
010 _a 2015945503
020 _a9781119028758
_qpaperback
035 _a(OCoLC)ocn900793411
040 _aBTCTA
_beng
_cBTCTA
_erda
_dBDX
_dYDXCP
_dCDX
_dIAD
_dOCLCO
_dFM0
_dUMS
_dOCLCF
_dCDN
_dDLC
_dUOC
042 _alccopycat
082 0 0 _a005.84
_223
_bJOX
100 1 _aKoret, Joxean
_eauthor.
_9839
245 1 4 _aThe antivirus hacker's handbook /
_cJoxean Koret, Elias Bachaalany.
264 1 _aIndianapolis, IN :
_bJohn Wiley & Sons Inc.,
_c[2015].
264 4 _c©2015 by John Wiley & Sons Inc.
300 _axxii, 359 pages :
_billustrations ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes index.
505 0 _aAntivirus basics -- Introduction to antivirus software -- Revere-engineering the core -- The plug-ins system -- Understanding antivirus signatures -- The update system -- Antivirus software evasion -- Evading signatures -- Evading scanners -- Evading heuristic engines -- Identifying the attack surface -- Denial of service -- Analysis and exploitation -- Static analysis -- Dynamic analysis -- Local exploitation -- Remote exploitation -- Current trends and recommendations -- Current trends in antivirus protection -- Recommendations and the possible future.
520 _a"The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight."-- Back cover.
650 0 _aComputer viruses.
_93215
650 0 _aHackers.
_9135
650 0 _aComputer security.
_93167
700 1 _aBachaalany, Elias
_eauthor.
_9840
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c256
_d256