000 | 03266cam a2200625Ii 4500 | ||
---|---|---|---|
001 | ocn919122975 | ||
003 | OCoLC | ||
005 | 20171024100917.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150825s2015 inu of 001 0 eng d | ||
020 |
_a9781119028765 _q(electronic bk.) |
||
020 |
_a1119028760 _q(electronic bk.) |
||
020 |
_a9781119183525 _q(electronic bk.) |
||
020 |
_a1119183529 _q(electronic bk.) |
||
020 |
_a1119028752 _q(pbk. ; _qalk. paper) |
||
020 |
_a9781119028758 _q(pbk. ; _qalk. paper) |
||
020 | _z9781119028758 | ||
029 | 1 |
_aGBVCP _b835799689 |
|
029 | 1 |
_aDEBBG _bBV043397998 |
|
029 | 1 |
_aDEBBG _bBV043968733 |
|
035 |
_a(OCoLC)919122975 _z(OCoLC)936042538 |
||
037 |
_aCL0500000707 _bSafari Books Online |
||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dOCLCO _dYDXCP _dDG1 _dOCLCF _dOCLCO _dCOO _dUMI _dOCLCO _dGK8 _dOCLCO _dOCLCQ _dOCLCO _dVT2 _dDEBBG _dCCO |
||
049 | _aMAIN | ||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aKoret, Joxean, _eauthor. |
|
245 | 1 | 4 |
_aThe antivirus hacker's handbook / _cJoxean Koret, Elias Bachaalany. _h[electronic resource] |
264 | 1 |
_aIndianapolis, IN : _bJohn Wiley & Sons, Inc., _c[2015] |
|
264 | 4 | _c©2015 | |
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _aIncludes index. | ||
505 | 0 | _aAntivirus basics -- Introduction to antivirus software -- Revere-engineering the core -- The plug-ins system -- Understanding antivirus signatures -- The update system -- Antivirus software evasion -- Evading signatures -- Evading scanners -- Evading heuristic engines -- Identifying the attack surface -- Denial of service -- Analysis and exploitation -- Static analysis -- Dynamic analysis -- Local exploitation -- Remote exploitation -- Current trends and recommendations -- Current trends in antivirus protection -- Recommendations and the possible future. | |
520 | _a"The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight."-- Back cover. | ||
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed August 26, 2015). | |
650 | 0 |
_aComputer security _vHandbooks, manuals, etc. |
|
650 | 0 |
_aComputer networks _xSecurity measures _vHandbooks, manuals, etc. |
|
650 | 0 |
_aComputer networks _xAccess control. |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer networks _xAccess control. _2fast _0(OCoLC)fst00872298 |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
655 | 4 | _aElectronic books. | |
655 | 7 |
_aHandbooks and manuals. _2fast _0(OCoLC)fst01423877 |
|
655 | 7 |
_aHandbooks and manuals. _2lcgft |
|
700 | 1 |
_aBachaalany, Elias, _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _aKoret, Joxean. _tAntivirus hacker's handbook. _dIndianapolis, IN : John Wiley and Sons, [2015] _z9781119028758 _w(DLC) 18684305 |
856 | 4 | 0 |
_uhttp://onlinelibrary.wiley.com/book/10.1002/9781119183525 _zWiley Online Library |
942 |
_2ddc _cBK |
||
999 |
_c208148 _d208148 |