|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm58752254 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
050401s2005 njua ob 001 0 eng d |
010 |
|
|
|a 2004114972
|
040 |
|
|
|a AD#
|b eng
|e pn
|c AD#
|d OCLCQ
|d CO3
|d VLB
|d OCLCQ
|d OCLCE
|d CEF
|d AZU
|d NHM
|d MBB
|d VMI
|d OCLCQ
|d OCLCF
|d OCLCQ
|d GO9
|d OCLCQ
|d YDX
|d OCLCA
|d WYU
|d OCLCO
|d OCLCA
|d OCLCQ
|d AU@
|d OCLCO
|d STF
|d OCLCO
|d VT2
|d UAB
|d CNCEN
|d LDP
|d UKBTH
|d UKAHL
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBA500602
|2 bnb
|
016 |
7 |
|
|a 013074025
|2 Uk
|
019 |
|
|
|a 607552166
|a 647985303
|a 692691399
|a 729549966
|a 748094487
|a 759518362
|a 809688944
|a 1044434981
|a 1048105788
|a 1048390072
|a 1056377140
|a 1061007317
|a 1066605335
|a 1073060311
|a 1100827387
|a 1103261280
|a 1104494103
|a 1129354725
|a 1153039126
|a 1159639182
|a 1227702256
|a 1229897980
|a 1240527639
|
020 |
|
|
|a 8131748243
|
020 |
|
|
|a 9788131748244
|
020 |
|
|
|z 0321304543
|q (pbk.)
|
020 |
|
|
|z 9780321304544
|q (pbk.)
|
020 |
|
|
|a 9780672333903
|q (e-book)
|
020 |
|
|
|a 0672333902
|
024 |
8 |
|
|a 9780321304544
|
024 |
8 |
|
|a 0321304543
|
029 |
1 |
|
|a HEBIS
|b 291437842
|
029 |
1 |
|
|a AU@
|b 000067112541
|
035 |
|
|
|a (OCoLC)58752254
|z (OCoLC)607552166
|z (OCoLC)647985303
|z (OCoLC)692691399
|z (OCoLC)729549966
|z (OCoLC)748094487
|z (OCoLC)759518362
|z (OCoLC)809688944
|z (OCoLC)1044434981
|z (OCoLC)1048105788
|z (OCoLC)1048390072
|z (OCoLC)1056377140
|z (OCoLC)1061007317
|z (OCoLC)1066605335
|z (OCoLC)1073060311
|z (OCoLC)1100827387
|z (OCoLC)1103261280
|z (OCoLC)1104494103
|z (OCoLC)1129354725
|z (OCoLC)1153039126
|z (OCoLC)1159639182
|z (OCoLC)1227702256
|z (OCoLC)1229897980
|z (OCoLC)1240527639
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.76.C68
|b S96 2005
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Szor, Peter.
|
245 |
1 |
4 |
|a The art of computer virus research and defense /
|c Peter Szor.
|
246 |
3 |
0 |
|a Computer virus research and defense
|
260 |
|
|
|a Upper Saddle River, NJ :
|b Addison-Wesley,
|c 2005.
|
300 |
|
|
|a 1 online resource (xxvii, 713 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
520 |
|
|
|a Symantec's chief antivirus researcher, Peter Szor, covers virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and more. Szor presents the state-of-the-art in malware and protection, providing the technical detail that professionals need to handle increasingly complex attacks. He provides information on code metamorphism and other emerging techniques, to anticipate and prepare for future threats.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Strategies of the attacker -- The fascination of malicious code analysis -- Malicious code environments -- Classification of infection strategies -- Classification of in-memory strategies -- Basic self-protection strategies -- Advanced code evolution techniques and computer virus generator kits -- Classification according to payload -- Strategies of computer worms -- Exploits, vulnerabilities, and buffer overflow attacks -- Strategies of the defender -- Antivirus defense techniques -- Memory scanning and disinfection -- Worm-blocking techniques and host-based intrusion prevention -- Network-level defense strategies -- Malicious code analysis techniques.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [S.l.] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
542 |
|
|
|f Copyright © 2005 Symantec Corporation
|g 2005
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer viruses.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Virus informatiques.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computer viruses
|2 fast
|
650 |
|
7 |
|a Abwehr
|2 gnd
|
650 |
|
7 |
|a Computersicherheit
|2 gnd
|
650 |
|
7 |
|a Datensicherung
|2 gnd
|
650 |
|
7 |
|a Computervirus
|2 gnd
|
650 |
|
7 |
|a Malware
|2 gnd
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
650 |
|
7 |
|a Computervirus
|v 0 Gesamtdarstellung.
|2 idsbb
|
776 |
0 |
8 |
|i Print version:
|a Szor, Peter.
|t Art of computer virus research and defense.
|d Upper Saddle River, NJ : Addison-Wesley, 2005
|z 0321304543
|w (DLC) 2004114972
|w (OCoLC)57382448
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0321304543/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37828789
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15629895
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14858716
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18071908
|
994 |
|
|
|a 92
|b IZTAP
|