000 03579cam a2200697Ii 4500
005 20250919213643.0
006 m o d
007 cr cnu|||unuuu
008 171212s2015 inu of 001 0 eng d
020 _a9781119028765
_q(electronic bk.)
020 _a1119028760
_q(electronic bk.)
020 _a9781119183525
_q(electronic bk.)
020 _a1119183529
_q(electronic bk.)
020 _a1119028752
_q(pbk. ;
_qalk. paper)
020 _a9781119028758
_q(pbk. ;
_qalk. paper)
020 _z9781119028758
029 1 _aGBVCP
_b835799689
029 1 _aDEBBG
_bBV043397998
029 1 _aDEBBG
_bBV043968733
035 _a(OCoLC)919122975
_z(OCoLC)936042538
035 _a(OCoLC)ocn919122975
037 _aCL0500000707
_bSafari Books Online
039 9 _a201902131136
_bmurni
_y12-12-2017
_zhafiz
_wMYUKM (1).mrc
_x719
040 _aNST
_beng
_erda
_epn
_cNST
_dNST
_dOCLCO
_dYDXCP
_dDG1
_dOCLCF
_dOCLCO
_dCOO
_dUMI
_dOCLCO
_dGK8
_dOCLCO
_dOCLCQ
_dOCLCO
_dVT2
_dDEBBG
_dCCO
049 _aMAIN
050 4 _aQA76.9.A25
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aKoret, Joxean,
_eauthor.
245 1 4 _aThe antivirus hacker's handbook /
_cJoxean Koret, Elias Bachaalany.
264 1 _aIndianapolis, IN :
_bJohn Wiley & Sons, Inc.,
_c[2015]
264 4 _c©2015
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aIncludes index.
505 0 _aAntivirus basics -- Introduction to antivirus software -- Revere-engineering the core -- The plug-ins system -- Understanding antivirus signatures -- The update system -- Antivirus software evasion -- Evading signatures -- Evading scanners -- Evading heuristic engines -- Identifying the attack surface -- Denial of service -- Analysis and exploitation -- Static analysis -- Dynamic analysis -- Local exploitation -- Remote exploitation -- Current trends and recommendations -- Current trends in antivirus protection -- Recommendations and the possible future.
520 _a'The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight.'-- Back cover.
588 0 _aOnline resource; title from PDF title page (EBSCO, viewed August 26, 2015).
650 0 _aComputer security
_vHandbooks, manuals, etc.
650 0 _aComputer networks
_xSecurity measures
_vHandbooks, manuals, etc.
650 0 _aComputer networks
_xAccess control.
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer networks
_xAccess control.
_2fast
_0(OCoLC)fst00872298
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
655 4 _aElectronic books.
655 7 _aHandbooks and manuals.
_2fast
_0(OCoLC)fst01423877
655 7 _aHandbooks and manuals.
_2lcgft
700 1 _aBachaalany, Elias,
_eauthor.
773 0 _tWiley e-books
776 0 8 _iPrint version:
_aKoret, Joxean.
_tAntivirus hacker's handbook.
_dIndianapolis, IN : John Wiley and Sons, [2015]
_z9781119028758
_w(DLC) 18684305
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://onlinelibrary.wiley.com/book/10.1002/9781119183525
_zWiley Online Library
907 _a.b16544560
_b2022-09-22
_c2019-11-12
942 _n0
914 _avtls003629390
998 _ae
_b2017-12-12
_cm
_dz
_feng
_ginu
_y0
_z.b16544560
999 _c691400
_d691400