Peter Szor systematically covers everything you need to know, The Art of Computer Virus Research and Defense: ART COMP VIRUS RES. Unlike most books on computer viruses, “The Art of Computer Virus Research and Defense” is a reference written strictly for white hats: IT and security. Unlike most books on computer viruses, The Art of Computer Virus Research and Peter Szor systematically covers everything you need to know, including.
|Published (Last):||26 November 2006|
|PDF File Size:||8.15 Mb|
|ePub File Size:||4.81 Mb|
|Price:||Free* [*Free Regsitration Required]|
Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks.
IT and security professionals This book’s coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: Malicious Code Analysis Techniques. Mapping Security Tom Patterson. Check out the top books of the year on our page Best Books of Book ratings by Goodreads. Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process.
Introduction to the Games of Nature. Memory Scanning and Disinfection. Symantec’s chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. The Art of Computer VirusResearch and Defense entertains readers with its look at anti-virus research, butmore importantly it truly arms them in the fight against computer viruses.
The Fascination of Malicious Code Analysis.
The Art of Computer Virus Research and Defense
No one’s rated or reviewed this product yet. The Digital Immune System References Read on your iOS and Android devices Get more info. Classification of Infection Strategies. DLL loaded loader machine macro viruses malicious code malware memory metamorphic method Microsoft modified module operating system overwrite password Peter Szor platforms pointer polymorphic engine portable executable problem processor replicate routine scanner scanning script server shellcode shown in Vorus simple stack stealth string target threats trick typically variants virtual virus body Virus Bulletin Virus Bulletin Conference virus code virus researchers virus writers vulnerable Windows 95 Windows CE Windows NT.
The Art of Computer Virus Research and Defense – Peter Szor – Google Books
Other books in this series. From inside the book. From toSzor wrote and maintained his own antivirus program, Pasteur. VIRUS wat do u get? Memory Scanning and Disinfection. Home Contact Us Help Free delivery worldwide. Peter Szor is security architect for Symantec Security Response, where he has been designing and building antivirus technologies for the Norton AntiVirus product line since Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats.
Symantec’s chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. References to this book Network Security Essentials: Back cover copy “Of all the computer-related books I’ve read recently, this one influenced my thoughts about security the most.
Applications and Standards William Stallings Snippet view – From toSzor wrote and maintained his own antivirus program, Pasteur.
Common terms and phrases address space algorithm antivirus software application attack binary block compurer sector buffer overflow bytes checksum CodeRed command computer viruses computer worms copy create debugger decryption decryptor detection disinfection disk diskette driver e-mail emulation encrypted entry point Eugene Kaspersky example executed exploit file format function handler header heuristic hook host program implement infect files infection techniques infector instruction Internet IP address kernel kernel-mode KERNEL Looking for beautiful books?
Theory of Self-Reproducing Automata Fredkin: My library Help Advanced Book Search. IT and security professionals responsible for protecting their organizations against malware. Dispatched from the UK in 2 business days When will my order arrive? Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Byshowing how viruses really work, this reseagch will help security professionals andstudents protect against them, recognize them, and analyze and limit thedamage they can do.
Your review will post soon.
Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. User Review – Flag as inappropriate idiots wat do u get to hack computers?
Capabilities Text to speech. Account Options Sign in. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book.
Classification of Infection Strategies.