01015nam0-2200325---450 99000958931040332120230414100321.0000958931FED01000958931(Aleph)000958931FED0100095893120120612d2001----km-y0itay50------baitaITa---b---001yy<<Il >>Museo di Arte sacra a Certaldoa cura di Rosanna Caterina Proto Pisanipresentazione di Antonio Paolucci[S. l.]Becocci/Scala200179 p.ill.24 cmBiblioteca de "Lo studiolo"26CertaldoMuseo di Arte sacraCataloghi708.55Proto Pisani,Rosanna CaterinaMuseo di Arte sacra<Certaldo>327093ITUNINARICAUNIMARCBK990009589310403321708.5 CFIR 0260670 Bibl.FLFBCFLFBCMuseo di Arte sacra a Certaldo846054UNINA01235nam0 22003011i 450 UON0028397320231205103850.89707-478-0647-020061117d2006 |0itac50 baengGB|||| 1||||ˆThe ‰Art of death in Graeco-Roman EgyptJudith A. CorbelliPrinces RisboroughShire Publicationsc200680 p.ill.22 cm001UON001632412001 Shire Egyptology series28RITI E CERIMONIE FUNERARIEEgitto Greco-RomanoUONC062772FIMONUMENTI FUNERARIEgitto Greco-RomanoUONC062773FICIVILTA' EGIZIANA ANTICAInfluenze EllenisticheUONC062774FIPrinces RisboroughUONL003093CORBELLIJudith A.UONV166730693033ShireUONV265226650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00283973SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI EG II a 040 SI AA 28463 5 040 Art of death in Graeco-Roman Egypt1245779UNIOR05267nam 2200661 450 991082421080332120200520144314.01-119-18352-91-119-02878-71-119-02876-0(CKB)3710000000466358(EBL)1985804(SSID)ssj0001654785(PQKBManifestationID)16435118(PQKBTitleCode)TC0001654785(PQKBWorkID)14981639(PQKB)11482836(Au-PeEL)EBL1985804(CaPaEBR)ebr11092844(OCoLC)919344166(CaSebORM)9781119028758(MiAaPQ)EBC1985804(PPN)242965008(EXLCZ)99371000000046635820150702h20152015 uy| 0engur|n|---|||||txtccrThe Antivirus hacker's handbook /Joxean Koret, Elias BachaalanyFirst edition.Indianapolis, IN :John Wiley and Sons,[2015]©20151 online resource (384 p.)Includes index.1-119-02875-2 Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the CoreReverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for LinuxOther Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-StreamsChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and ConquerEvading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format WeaknessesUsing Anti-emulation TechniquesHack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the funcHackersHandbooks, manuals, etcComputer virusesHandbooks, manuals, etcHackersComputer viruses005.84Koret Joxean1604566Bachaalany EliasMiAaPQMiAaPQMiAaPQBOOK9910824210803321The Antivirus hacker's handbook3929481UNINA02984nam 2200637 450 991082324730332120230124192727.00-8389-1268-0(CKB)3710000000264452(EBL)1822792(SSID)ssj0001350430(PQKBManifestationID)12538056(PQKBTitleCode)TC0001350430(PQKBWorkID)11289077(PQKB)10071152(MiAaPQ)EBC1822792(Au-PeEL)EBL1822792(CaPaEBR)ebr10959921(OCoLC)893732381(EXLCZ)99371000000026445220141113h20152015 uy 0engur|n|---|||||txtccrNew on the job a school librarian's guide to success /Hilda K. Weisburg and Ruth Toor ; cover design by Kimberly ThorntonSecond edition.Chicago, Illinois :ALA Editions,2015.©20151 online resource (238 p.)Includes index.0-8389-1264-8 NEW on the JOB: A School Librarian's Guide to Success; Contents; Foreword; Introduction; Chapter 1: Your Philosophy; Chapter 2: Getting the Job; Chapter 3: Finding Your Way; Chapter 4: Getting Yourself Organized; Chapter 5: Reaching Your Students; Chapter 6: Reaching Your Teachers; Chapter 7: A Matter of Principals; Chapter 8: Advocacy and You; Chapter 9: Planning; Chapter 10: Technology and You; Chapter 11: Ethics, Standards, and You; Chapter 12: Looking Back, Looking Forward; Appendixes; Appendix A: Essential Resources; Appendix B: Jobbers and Vendors; Glossary; IndexFrom job search strategies and discovering work philosophy to the nitty-gritty details of creating acceptable use policies, this revised and updated edition, which includes a new foreword from Sarah Kelly Johns, shares the joys and perils of the profession along with a wealth of practical advice from decades of experience in school library programs.School librariansUnited StatesHandbooks, manuals, etcInstructional materials personnelUnited StatesHandbooks, manuals, etcSchool librariesUnited StatesHandbooks, manuals, etcInstructional materials centersUnited StatesHandbooks, manuals, etcLibrary scienceVocational guidanceUnited StatesSchool librariansInstructional materials personnelSchool librariesInstructional materials centersLibrary scienceVocational guidance027.80973Weisburg Hilda K.1942-1668638Toor Ruth1933-Thornton KimberlyMiAaPQMiAaPQMiAaPQBOOK9910823247303321New on the job4097367UNINA