000 | 03515cam a2200685Ii 4500 | ||
---|---|---|---|
001 | sulb-eb0033996 | ||
003 | BD-SySUS | ||
005 | 20170713221425.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150825s2015 inu of 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dOCLCO _dYDXCP _dDG1 _dOCLCF _dOCLCO _dCOO _dUMI _dOCLCO _dGK8 _dOCLCO _dOCLCQ _dOCLCO _dVT2 _dDEBBG _dCCO _dBD-SySUS |
||
019 | _a936042538 | ||
020 |
_a9781119028765 _q(electronic bk.) |
||
020 |
_a1119028760 _q(electronic bk.) |
||
020 |
_a9781119183525 _q(electronic bk.) |
||
020 |
_a1119183529 _q(electronic bk.) |
||
020 |
_a1119028752 _q(pbk. ; _qalk. paper) |
||
020 |
_a9781119028758 _q(pbk. ; _qalk. paper) |
||
020 | _z9781119028758 | ||
029 | 1 |
_aGBVCP _b835799689 |
|
029 | 1 |
_aDEBBG _bBV043397998 |
|
029 | 1 |
_aDEBBG _bBV043968733 |
|
035 |
_a(OCoLC)919122975 _z(OCoLC)936042538 |
||
037 |
_aCL0500000707 _bSafari Books Online |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aKoret, Joxean, _eauthor. |
|
245 | 1 | 4 |
_aThe antivirus hacker's handbook / _cJoxean Koret, Elias Bachaalany. |
264 | 1 |
_aIndianapolis, IN : _bJohn Wiley & Sons, Inc., _c[2015] |
|
264 | 4 | _c©2015 | |
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _aIncludes index. | ||
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed August 26, 2015). | |
505 | 0 | _aAntivirus basics -- Introduction to antivirus software -- Revere-engineering the core -- The plug-ins system -- Understanding antivirus signatures -- The update system -- Antivirus software evasion -- Evading signatures -- Evading scanners -- Evading heuristic engines -- Identifying the attack surface -- Denial of service -- Analysis and exploitation -- Static analysis -- Dynamic analysis -- Local exploitation -- Remote exploitation -- Current trends and recommendations -- Current trends in antivirus protection -- Recommendations and the possible future. | |
520 | _a"The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight."-- Back cover. | ||
650 | 0 |
_aComputer security _vHandbooks, manuals, etc. |
|
650 | 0 |
_aComputer networks _xSecurity measures _vHandbooks, manuals, etc. |
|
650 | 0 |
_aComputer networks _xAccess control. |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer networks _xAccess control. _2fast _0(OCoLC)fst00872298 |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
655 | 4 | _aElectronic books. | |
655 | 7 |
_aHandbooks and manuals. _2fast _0(OCoLC)fst01423877 |
|
655 | 7 |
_aHandbooks and manuals. _2lcgft |
|
700 | 1 |
_aBachaalany, Elias, _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _aKoret, Joxean. _tAntivirus hacker's handbook. _dIndianapolis, IN : John Wiley and Sons, [2015] _z9781119028758 _w(DLC) 18684305 |
856 | 4 | 0 |
_uhttp://onlinelibrary.wiley.com/book/10.1002/9781119183525 _zWiley Online Library [Free Download only for SUST IP] |
938 |
_aEBSCOhost _bEBSC _n1055956 |
||
938 |
_aYBP Library Services _bYANK _n12585906 |
||
938 |
_aYBP Library Services _bYANK _n12588500 |
||
938 |
_aYBP Library Services _bYANK _n12643413 |
||
994 |
_a92 _bDG1 |
||
999 |
_c65648 _d65648 |