|
|
|
|
LEADER |
03229nam a2200625 4500 |
001 |
ocn919122975 |
003 |
OCoLC |
005 |
20170124071502.8 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
150825s2015 inu of 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d OCLCO
|d YDXCP
|d DG1
|d OCLCF
|d OCLCO
|d COO
|d UMI
|d OCLCO
|d GK8
|d OCLCO
|d OCLCQ
|d OCLCO
|d VT2
|d DEBBG
|d CCO
|d GrThAP
|
019 |
|
|
|a 936042538
|
020 |
|
|
|a 9781119028765
|q (electronic bk.)
|
020 |
|
|
|a 1119028760
|q (electronic bk.)
|
020 |
|
|
|a 9781119183525
|q (electronic bk.)
|
020 |
|
|
|a 1119183529
|q (electronic bk.)
|
020 |
|
|
|a 1119028752
|q (pbk. ;
|q alk. paper)
|
020 |
|
|
|a 9781119028758
|q (pbk. ;
|q alk. paper)
|
020 |
|
|
|z 9781119028758
|
029 |
1 |
|
|a GBVCP
|b 835799689
|
029 |
1 |
|
|a DEBBG
|b BV043397998
|
029 |
1 |
|
|a DEBBG
|b BV043968733
|
035 |
|
|
|a (OCoLC)919122975
|z (OCoLC)936042538
|
037 |
|
|
|a CL0500000707
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a MAIN
|
100 |
1 |
|
|a Koret, Joxean,
|e author.
|
245 |
1 |
4 |
|a The antivirus hacker's handbook /
|c Joxean Koret, Elias Bachaalany.
|
264 |
|
1 |
|a Indianapolis, IN :
|b John Wiley & Sons, Inc.,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed August 26, 2015).
|
505 |
0 |
|
|a Antivirus basics -- Introduction to antivirus software -- Revere-engineering the core -- The plug-ins system -- Understanding antivirus signatures -- The update system -- Antivirus software evasion -- Evading signatures -- Evading scanners -- Evading heuristic engines -- Identifying the attack surface -- Denial of service -- Analysis and exploitation -- Static analysis -- Dynamic analysis -- Local exploitation -- Remote exploitation -- Current trends and recommendations -- Current trends in antivirus protection -- Recommendations and the possible future.
|
520 |
|
|
|a "The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight."-- Back cover.
|
650 |
|
0 |
|a Computer security
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Access control.
|2 fast
|0 (OCoLC)fst00872298
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
655 |
|
4 |
|a Electronic books.
|
655 |
|
7 |
|a Handbooks and manuals.
|2 fast
|0 (OCoLC)fst01423877
|
655 |
|
7 |
|a Handbooks and manuals.
|2 lcgft
|
700 |
1 |
|
|a Bachaalany, Elias,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Koret, Joxean.
|t Antivirus hacker's handbook.
|d Indianapolis, IN : John Wiley and Sons, [2015]
|z 9781119028758
|w (DLC) 18684305
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781119183525
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|