Art of Computer Virus Research and Defense, The, Portable Documents

Art of Computer Virus Research and Defense, The, Portable Documents
Author :
Publisher : Pearson Education
Total Pages : 884
Release :
ISBN-10 : 9780672333903
ISBN-13 : 0672333902
Rating : 4/5 (902 Downloads)

Book Synopsis Art of Computer Virus Research and Defense, The, Portable Documents by : Peter Szor

Download or read book Art of Computer Virus Research and Defense, The, Portable Documents written by Peter Szor and published by Pearson Education. This book was released on 2005-02-03 with total page 884 pages. Available in PDF, EPUB and Kindle. Book excerpt: Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code—and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies


Art of Computer Virus Research and Defense, The, Portable Documents Related Books

Art of Computer Virus Research and Defense, The, Portable Documents
Language: en
Pages: 884
Authors: Peter Szor
Categories: Computers
Type: BOOK - Published: 2005-02-03 - Publisher: Pearson Education

GET EBOOK

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books
Computer Viruses and Malware
Language: en
Pages: 234
Authors: John Aycock
Categories: Computers
Type: BOOK - Published: 2006-09-19 - Publisher: Springer Science & Business Media

GET EBOOK

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Com
An Executive's Guide to Information Technology
Language: en
Pages: 363
Authors: Robert Plant
Categories: Technology & Engineering
Type: BOOK - Published: 2007-05-17 - Publisher: Cambridge University Press

GET EBOOK

Assessing the most valuable technology for an organization is becoming a growing challenge for business professionals confronted with an expanding array of opti
Computer Networks and Intelligent Computing
Language: en
Pages: 701
Authors: K. R. Venugopal
Categories: Computers
Type: BOOK - Published: 2011-07-20 - Publisher: Springer Science & Business Media

GET EBOOK

This book constitutes the refereed proceedings of the 5th International Conference on Information Processing, ICIP 2011, held in Bangalore, India, in August 201
Leveraging Applications of Formal Methods, Verification and Validation. Modeling
Language: en
Pages: 599
Authors: Tiziana Margaria
Categories: Computers
Type: BOOK - Published: 2018-10-28 - Publisher: Springer

GET EBOOK

The four-volume set LNCS 11244, 11245, 11246, and 11247 constitutes the refereed proceedings of the 8th International Symposium on Leveraging Applications of Fo