LEADER 03360nam 22005295 450 001 9910741173603321 005 20230915134433.0 010 $a981-9942-09-8 024 7 $a10.1007/978-981-99-4209-1 035 $a(CKB)27943530800041 035 $a(DE-He213)978-981-99-4209-1 035 $a(MiAaPQ)EBC31094172 035 $a(Au-PeEL)EBL31094172 035 $a(EXLCZ)9927943530800041 100 $a20230808d2023 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEconomic Analysis of Mental Health in China$b[electronic resource] /$fby Xuezheng Qin, Chee-Ruey Hsieh 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (IX, 165 p. 11 illus., 4 illus. in color.) 225 1 $aApplied Economics and Policy Studies,$x2731-4014 311 $a9789819942084 327 $aIntroduction -- The Prevalence of Depression and Depressive Symptoms -- Depression Hurts, Depression Costs. 330 $aThis book uses an economic approach to analyze the socioeconomic causes and consequences of mental health disorders in China, with a special focus on mental depression. Based on a nationally representative dataset, we first investigate the prevalence and distribution of depression and depressive symptoms among China?s adult population, and then use several econometric methods to estimate the multi-dimensional disease burden of the mental disorder, such as its direct medical costs, its indirect economic costs, and its hidden costs on social trust and life satisfaction. In addition, we specifically address the socioeconomic determinants of mental health by examining how the relative and absolute economic status may determine people?s mental depression. Lastly, we propose an analytical framework to evaluate the four major hurdles that cause the treatment gaps of mental health care, and discuss the policy options to overcome such hurdles and to address the unmet mental healthcare needs in China and other developing countries. The book may facilitate our understanding on the complex determinants and implications of the rising prevalence of mental health disorders in developing countries like China. In addition to the students, teachers, and researchers in the fields of health economics and public health, the book may also be of interest to health policy makers and non-government agencies who are concerned with addressing the global mental healthcare challenges using economic policy tools. 410 0$aApplied Economics and Policy Studies,$x2731-4014 606 $aMedical economics 606 $aQuality of life 606 $aHealth Economics 606 $aQuality of Life Research 615 0$aMedical economics. 615 0$aQuality of life. 615 14$aHealth Economics. 615 24$aQuality of Life Research. 676 $a338.4761 700 $aQin$b Xuezheng$4aut$4http://id.loc.gov/vocabulary/relators/aut$01587809 702 $aHsieh$b Chee-Ruey$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910741173603321 996 $aEconomic Analysis of Mental Health in China$93876332 997 $aUNINA LEADER 05267nam 2200661 450 001 9910824210803321 005 20200520144314.0 010 $a1-119-18352-9 010 $a1-119-02878-7 010 $a1-119-02876-0 035 $a(CKB)3710000000466358 035 $a(EBL)1985804 035 $a(SSID)ssj0001654785 035 $a(PQKBManifestationID)16435118 035 $a(PQKBTitleCode)TC0001654785 035 $a(PQKBWorkID)14981639 035 $a(PQKB)11482836 035 $a(Au-PeEL)EBL1985804 035 $a(CaPaEBR)ebr11092844 035 $a(OCoLC)919344166 035 $a(CaSebORM)9781119028758 035 $a(MiAaPQ)EBC1985804 035 $a(PPN)242965008 035 $a(EXLCZ)993710000000466358 100 $a20150702h20152015 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe Antivirus hacker's handbook /$fJoxean Koret, Elias Bachaalany 205 $aFirst edition. 210 1$aIndianapolis, IN :$cJohn Wiley and Sons,$d[2015] 210 4$dİ2015 215 $a1 online resource (384 p.) 300 $aIncludes index. 311 $a1-119-02875-2 327 $aCover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core 327 $aReverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux 327 $aOther Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams 327 $aChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer 327 $aEvading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses 327 $aUsing Anti-emulation Techniques 330 $aHack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the func 606 $aHackers$vHandbooks, manuals, etc 606 $aComputer viruses$vHandbooks, manuals, etc 615 0$aHackers 615 0$aComputer viruses 676 $a005.84 700 $aKoret$b Joxean$01604566 702 $aBachaalany$b Elias 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910824210803321 996 $aThe Antivirus hacker's handbook$93929481 997 $aUNINA