000 02349cam a22004457i 4500
001 18684305
003 USANT
005 20250620084222.0
008 240619t20152015inua 001 0 eng d
010 _a 2015945503
020 _a9781119028758
020 _a1119028752
035 _a(OCoLC)ocn900793411
040 _aUSANT
_beng
_cUSANT
_erda
042 _alccopycat
050 0 0 _aQA76.76.C68
_bK67 2015
082 0 4 _a005.84
_223
_bK79
100 1 _aKoret, Joxean,
_eauthor.
245 1 4 _aThe antivirus hacker's handbook /
_cJoxean Koret, Elias Bachaalany.
264 1 _aIndianapolis, IN :
_bJohn Wiley & Sons Inc.,
_c2015.
264 4 _c©2015
300 _axxii, 359 pages :
_billustrations ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
500 _aIncludes index.
505 0 _aAntivirus basics -- Introduction to antivirus software -- Revere-engineering the core -- The plug-ins system -- Understanding antivirus signatures -- The update system -- Antivirus software evasion -- Evading signatures -- Evading scanners -- Evading heuristic engines -- Identifying the attack surface -- Denial of service -- Analysis and exploitation -- Static analysis -- Dynamic analysis -- Local exploitation -- Remote exploitation -- Current trends and recommendations -- Current trends in antivirus protection -- Recommendations and the possible future.
520 _a"The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight."-- Back cover.
650 0 _aComputer viruses
_xPrevention.
650 0 _aHacking.
650 0 _aReverse engineering.
650 0 _aComputer security.
700 1 _aBachaalany, Elias,
_eauthor.
856 4 2 _3Contributor biographical information
_uhttps://www.loc.gov/catdir/enhancements/fy1614/2015945503-b.html
856 4 2 _3Publisher description
_uhttps://www.loc.gov/catdir/enhancements/fy1614/2015945503-d.html
856 4 1 _3Table of contents only
_uhttps://www.loc.gov/catdir/enhancements/fy1614/2015945503-t.html
942 _2ddc
_cBK
_h005.8
_iK79
_kCIR
_m2015
_n0
999 _c1196
_d1196