000 03515cam a2200685Ii 4500
001 sulb-eb0033996
003 BD-SySUS
005 20170713221425.0
006 m o d
007 cr cnu|||unuuu
008 150825s2015 inu of 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dOCLCO
_dYDXCP
_dDG1
_dOCLCF
_dOCLCO
_dCOO
_dUMI
_dOCLCO
_dGK8
_dOCLCO
_dOCLCQ
_dOCLCO
_dVT2
_dDEBBG
_dCCO
_dBD-SySUS
019 _a936042538
020 _a9781119028765
_q(electronic bk.)
020 _a1119028760
_q(electronic bk.)
020 _a9781119183525
_q(electronic bk.)
020 _a1119183529
_q(electronic bk.)
020 _a1119028752
_q(pbk. ;
_qalk. paper)
020 _a9781119028758
_q(pbk. ;
_qalk. paper)
020 _z9781119028758
029 1 _aGBVCP
_b835799689
029 1 _aDEBBG
_bBV043397998
029 1 _aDEBBG
_bBV043968733
035 _a(OCoLC)919122975
_z(OCoLC)936042538
037 _aCL0500000707
_bSafari Books Online
050 4 _aQA76.9.A25
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aKoret, Joxean,
_eauthor.
245 1 4 _aThe antivirus hacker's handbook /
_cJoxean Koret, Elias Bachaalany.
264 1 _aIndianapolis, IN :
_bJohn Wiley & Sons, Inc.,
_c[2015]
264 4 _c©2015
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aIncludes index.
588 0 _aOnline resource; title from PDF title page (EBSCO, viewed August 26, 2015).
505 0 _aAntivirus basics -- Introduction to antivirus software -- Revere-engineering the core -- The plug-ins system -- Understanding antivirus signatures -- The update system -- Antivirus software evasion -- Evading signatures -- Evading scanners -- Evading heuristic engines -- Identifying the attack surface -- Denial of service -- Analysis and exploitation -- Static analysis -- Dynamic analysis -- Local exploitation -- Remote exploitation -- Current trends and recommendations -- Current trends in antivirus protection -- Recommendations and the possible future.
520 _a"The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight."-- Back cover.
650 0 _aComputer security
_vHandbooks, manuals, etc.
650 0 _aComputer networks
_xSecurity measures
_vHandbooks, manuals, etc.
650 0 _aComputer networks
_xAccess control.
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer networks
_xAccess control.
_2fast
_0(OCoLC)fst00872298
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
655 4 _aElectronic books.
655 7 _aHandbooks and manuals.
_2fast
_0(OCoLC)fst01423877
655 7 _aHandbooks and manuals.
_2lcgft
700 1 _aBachaalany, Elias,
_eauthor.
776 0 8 _iPrint version:
_aKoret, Joxean.
_tAntivirus hacker's handbook.
_dIndianapolis, IN : John Wiley and Sons, [2015]
_z9781119028758
_w(DLC) 18684305
856 4 0 _uhttp://onlinelibrary.wiley.com/book/10.1002/9781119183525
_zWiley Online Library [Free Download only for SUST IP]
938 _aEBSCOhost
_bEBSC
_n1055956
938 _aYBP Library Services
_bYANK
_n12585906
938 _aYBP Library Services
_bYANK
_n12588500
938 _aYBP Library Services
_bYANK
_n12643413
994 _a92
_bDG1
999 _c65648
_d65648