Cargando…

The art of computer virus research and defense /

Symantec's chief antivirus researcher, Peter Szor, covers virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and more. Szor presents the state-of-the-art in malware and protection, providing the technical detail that professionals need to handle in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Szor, Peter
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, NJ : Addison-Wesley, 2005.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocm58752254
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 050401s2005 njua ob 001 0 eng d
010 |a  2004114972 
040 |a AD#  |b eng  |e pn  |c AD#  |d OCLCQ  |d CO3  |d VLB  |d OCLCQ  |d OCLCE  |d CEF  |d AZU  |d NHM  |d MBB  |d VMI  |d OCLCQ  |d OCLCF  |d OCLCQ  |d GO9  |d OCLCQ  |d YDX  |d OCLCA  |d WYU  |d OCLCO  |d OCLCA  |d OCLCQ  |d AU@  |d OCLCO  |d STF  |d OCLCO  |d VT2  |d UAB  |d CNCEN  |d LDP  |d UKBTH  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBA500602  |2 bnb 
016 7 |a 013074025  |2 Uk 
019 |a 607552166  |a 647985303  |a 692691399  |a 729549966  |a 748094487  |a 759518362  |a 809688944  |a 1044434981  |a 1048105788  |a 1048390072  |a 1056377140  |a 1061007317  |a 1066605335  |a 1073060311  |a 1100827387  |a 1103261280  |a 1104494103  |a 1129354725  |a 1153039126  |a 1159639182  |a 1227702256  |a 1229897980  |a 1240527639 
020 |a 8131748243 
020 |a 9788131748244 
020 |z 0321304543  |q (pbk.) 
020 |z 9780321304544  |q (pbk.) 
020 |a 9780672333903  |q (e-book) 
020 |a 0672333902 
024 8 |a 9780321304544 
024 8 |a 0321304543 
029 1 |a HEBIS  |b 291437842 
029 1 |a AU@  |b 000067112541 
035 |a (OCoLC)58752254  |z (OCoLC)607552166  |z (OCoLC)647985303  |z (OCoLC)692691399  |z (OCoLC)729549966  |z (OCoLC)748094487  |z (OCoLC)759518362  |z (OCoLC)809688944  |z (OCoLC)1044434981  |z (OCoLC)1048105788  |z (OCoLC)1048390072  |z (OCoLC)1056377140  |z (OCoLC)1061007317  |z (OCoLC)1066605335  |z (OCoLC)1073060311  |z (OCoLC)1100827387  |z (OCoLC)1103261280  |z (OCoLC)1104494103  |z (OCoLC)1129354725  |z (OCoLC)1153039126  |z (OCoLC)1159639182  |z (OCoLC)1227702256  |z (OCoLC)1229897980  |z (OCoLC)1240527639 
042 |a dlr 
050 4 |a QA76.76.C68  |b S96 2005 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Szor, Peter. 
245 1 4 |a The art of computer virus research and defense /  |c Peter Szor. 
246 3 0 |a Computer virus research and defense 
260 |a Upper Saddle River, NJ :  |b Addison-Wesley,  |c 2005. 
300 |a 1 online resource (xxvii, 713 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a Symantec's chief antivirus researcher, Peter Szor, covers virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and more. Szor presents the state-of-the-art in malware and protection, providing the technical detail that professionals need to handle increasingly complex attacks. He provides information on code metamorphism and other emerging techniques, to anticipate and prepare for future threats. 
504 |a Includes bibliographical references and index. 
505 0 |a Strategies of the attacker -- The fascination of malicious code analysis -- Malicious code environments -- Classification of infection strategies -- Classification of in-memory strategies -- Basic self-protection strategies -- Advanced code evolution techniques and computer virus generator kits -- Classification according to payload -- Strategies of computer worms -- Exploits, vulnerabilities, and buffer overflow attacks -- Strategies of the defender -- Antivirus defense techniques -- Memory scanning and disinfection -- Worm-blocking techniques and host-based intrusion prevention -- Network-level defense strategies -- Malicious code analysis techniques. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [S.l.] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
542 |f Copyright © 2005 Symantec Corporation  |g 2005 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer viruses. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Virus informatiques. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
650 7 |a Computer viruses  |2 fast 
650 7 |a Abwehr  |2 gnd 
650 7 |a Computersicherheit  |2 gnd 
650 7 |a Datensicherung  |2 gnd 
650 7 |a Computervirus  |2 gnd 
650 7 |a Malware  |2 gnd 
650 7 |a Engineering & Applied Sciences.  |2 hilcc 
650 7 |a Computer Science.  |2 hilcc 
650 7 |a Computervirus  |v 0 Gesamtdarstellung.  |2 idsbb 
776 0 8 |i Print version:  |a Szor, Peter.  |t Art of computer virus research and defense.  |d Upper Saddle River, NJ : Addison-Wesley, 2005  |z 0321304543  |w (DLC) 2004114972  |w (OCoLC)57382448 
856 4 0 |u https://learning.oreilly.com/library/view/~/0321304543/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37828789 
938 |a YBP Library Services  |b YANK  |n 15629895 
938 |a YBP Library Services  |b YANK  |n 14858716 
938 |a YBP Library Services  |b YANK  |n 18071908 
994 |a 92  |b IZTAP