|
|
|
|
LEADER |
03641nam a22005655i 4500 |
001 |
978-2-287-28099-3 |
003 |
DE-He213 |
005 |
20151204143900.0 |
007 |
cr nn 008mamaa |
008 |
100301s2005 fr | s |||| 0|eng d |
020 |
|
|
|a 9782287280993
|9 978-2-287-28099-3
|
024 |
7 |
|
|a 10.1007/2-287-28099-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D35
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
100 |
1 |
|
|a Filiol, Eric.
|e author.
|
245 |
1 |
0 |
|a Computer viruses: from theory to applications
|h [electronic resource] /
|c by Eric Filiol.
|
264 |
|
1 |
|a Paris :
|b Springer Paris,
|c 2005.
|
300 |
|
|
|a XXIV, 400 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Collection IRIS
|
505 |
0 |
|
|a Genesis and Theory of Computer Viruses -- The Formalization Foundations: from Turing to von Neumann (1936 – 1967) -- F. Cohen and L. Adleman’s Formalization (1984 – 1989) -- Taxonomy, Techniques and Tools -- Fighting Against Viruses -- Learning Computer Viruses by Programming -- Computer Viruses in Interpreted Programming Language -- Companion Viruses -- Worms -- Computer Viruses and Applications -- Computer Viruses and Applications -- BIOS Viruses -- Applied Cryptanalysis of Cipher Systems: The YMUN20 Virus -- Conclusion -- Conclusion.
|
520 |
|
|
|a “Viruses don’t harm, ignorance does. Is ignorance a defense?” herm1t “[...] I am convinced that computer viruses are not evil and that programmers have a right to create them, to possess them and to experiment with them ... truth seekers and wise men have been per- ´ secuted by powerful idiots in every age ...’ Mark A. Ludwig Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Article 19 of Universal Declaration of Human Rights The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they work. To do this, three aspects are covered ranging from theoretical fundamentals, to pr- tical applications and technical features; fully detailed, commented source 1 We will systematically use the plural form “viruses” instead of the litteral one “virii”. The latter is now an obsolete, though gramatically recommended, form. VIII Preface codes of viruses as well as inherent applications are proposed. So far, the applications-oriented aspects have hardly ever been addressed through the scarce existing literature devoted to computer viruses.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Algebra.
|
650 |
|
0 |
|a Ordered algebraic structures.
|
650 |
|
0 |
|a Combinatorics.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Algebra.
|
650 |
2 |
4 |
|a Order, Lattices, Ordered Algebraic Structures.
|
650 |
2 |
4 |
|a Combinatorics.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9782287239397
|
830 |
|
0 |
|a Collection IRIS
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/2-287-28099-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|