LEADER 01040nam0-22002891i-450- 001 990004911350403321 005 19990530 035 $a000491135 035 $aFED01000491135 035 $a(Aleph)000491135FED01 035 $a000491135 100 $a19990530g18829999km-y0itay50------ba 101 0 $aita 105 $aa-------00--- 200 1 $a<>fifty earliest english wills in the court of probate, London$eA D 1387-1439 with a priest's or 1454$eCopies and edited from the original registers in Somerset house$fby Frederick J. Furnivall 210 $aLondon$cOxford University Press$d1882. 215 $aXVI, 200 p.$cill.$d23 cm 225 1 $aEarly English text society$iOriginal series$v78 325 $aRistampa del 1964. - 700 1$aFurnivall,$bFrederick James$0184454 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004911350403321 952 $aYR 1A 78$bFil. Mod. 33871$fFLFBC 959 $aFLFBC 996 $aFifty earliest english wills in the court of probate, London$9524949 997 $aUNINA LEADER 05266nam 2200661 450 001 9910131650203321 005 20200520144314.0 010 $a1-119-18352-9 010 $a1-119-02878-7 010 $a1-119-02876-0 035 $a(CKB)3710000000466358 035 $a(EBL)1985804 035 $a(SSID)ssj0001654785 035 $a(PQKBManifestationID)16435118 035 $a(PQKBTitleCode)TC0001654785 035 $a(PQKBWorkID)14981639 035 $a(PQKB)11482836 035 $a(Au-PeEL)EBL1985804 035 $a(CaPaEBR)ebr11092844 035 $a(OCoLC)919344166 035 $a(CaSebORM)9781119028758 035 $a(MiAaPQ)EBC1985804 035 $a(PPN)242965008 035 $a(EXLCZ)993710000000466358 100 $a20150702h20152015 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe Antivirus hacker's handbook /$fJoxean Koret, Elias Bachaalany 205 $aFirst edition. 210 1$aIndianapolis, IN :$cJohn Wiley and Sons,$d[2015] 210 4$dİ2015 215 $a1 online resource (384 p.) 300 $aIncludes index. 311 $a1-119-02875-2 327 $aCover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core 327 $aReverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux 327 $aOther Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams 327 $aChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer 327 $aEvading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses 327 $aUsing Anti-emulation Techniques 330 $aHack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the func 606 $aHackers$vHandbooks, manuals, etc 606 $aComputer viruses$vHandbooks, manuals, etc 615 0$aHackers 615 0$aComputer viruses 676 $a005.84 700 $aKoret$b Joxean$0950019 702 $aBachaalany$b Elias 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910131650203321 996 $aThe Antivirus hacker's handbook$92147773 997 $aUNINA LEADER 02087oam 2200637 450 001 9910705617603321 005 20170531111037.0 035 $a(CKB)5470000002452224 035 $a(OCoLC)940444054$z(OCoLC)892852310 035 $a(EXLCZ)995470000002452224 100 $a20160220d2009 ua 0 101 0 $aeng 135 $aurbn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Army Medical Department, 1917-1941 /$fby Mary C. Gillett 210 1$aWashington, D.C. :$cCenter of Military History, United States Army,$d2009. 215 $a1 online resource (xx, 644 pages) $cillustrations (some color), color maps 225 1 $aArmy historical series 225 1 $aCMH Pub ;$v30-10-1 300 $aPrint version available for sale by the Superintendent of Documents, U.S. Government Publishing Office. 320 $aIncludes bibliographical references (pages 575-620) and index. 606 $aMedicine, Military$zUnited States$xHistory$y20th century 606 $aWorld War, 1914-1918$xMedical care$zUnited States 606 $aMilitary Medicine$xhistory 606 $aWorld War I 606 $aHistory, 20th Century 606 $aMedical care$2fast 606 $aMedicine, Military$2fast 607 $aUnited States 607 $aUnited States$2fast 608 $aHistory.$2fast 615 0$aMedicine, Military$xHistory 615 0$aWorld War, 1914-1918$xMedical care 615 12$aMilitary Medicine$xhistory. 615 22$aWorld War I. 615 22$aHistory, 20th Century. 615 7$aMedical care. 615 7$aMedicine, Military. 676 $a355.3/45097309041 700 $aGillett$b Mary C.$01389890 712 02$aCenter of Military History, 801 0$bOCLCE 801 1$bOCLCE 801 2$bOCLCO 801 2$bOIP 801 2$bOCL 801 2$bOCLCQ 801 2$bOCLCO 801 2$bOCLCQ 801 2$bGPO 906 $aBOOK 912 $a9910705617603321 996 $aThe Army Medical Department, 1917-1941$93519563 997 $aUNINA