The antivirus hacker's handbook
The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight."--Back cover
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
John Wiley & Sons, Inc.
[2015]
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 54228 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219014658.0 | ||
| 008 | 221104 20152015inua | 001 0 eng d | ||
| 020 | |a 9781119028758 | ||
| 020 | |z 978119028765 (ebk) | ||
| 020 | |z 978119028789 (ebk) | ||
| 039 | 9 | |a 202211041235 |b VLOAD |c 202002111532 |d faezah |y 201904030957 |z helmey | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a QA 76.9.A25 |b K67 2015 | ||
| 100 | 1 | |a Koret, Joxean |e author | |
| 245 | 1 | 4 | |a The antivirus hacker's handbook |c Joxean Koret, Elias Bachaalany |
| 264 | 1 | |a Indianapolis, IN |b John Wiley & Sons, Inc. |c [2015] | |
| 264 | 4 | |c © 2015 | |
| 300 | |a xxii, 359 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 500 | |a Includes index | ||
| 505 | 0 | |a Antivirus basics -- Introduction to antivirus software -- Revere-engineering the core -- The plug-ins system -- nderstanding antivirus signatures -- The update system -- Antivirus software evasion -- Evading signatures -- Evading scanners -- Evading heuristic engines -- Identifying the attack surface -- Denial of service -- Analysis and exploitation -- Static analysis -- Dynamic analysis -- Local exploitation -- Remote exploitation -- Current trends and recommendations -- Current trends in antivirus protection -- Recommendations and the possible future | |
| 520 | |a The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight."--Back cover | ||
| 592 | |a 00101/HL/2019 (750) |b 27/9/2019 |c RM 224.68 |h Han Lin Books | ||
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a Computer networks |x access control | |
| 700 | 1 | |a Bachaalany, Elias |e author | |
| 999 | |a vtls000063174 |c 54228 |d 54228 | ||


