LEADER 05267nam 2200661 450 001 9910824210803321 005 20200520144314.0 010 $a1-119-18352-9 010 $a1-119-02878-7 010 $a1-119-02876-0 035 $a(CKB)3710000000466358 035 $a(EBL)1985804 035 $a(SSID)ssj0001654785 035 $a(PQKBManifestationID)16435118 035 $a(PQKBTitleCode)TC0001654785 035 $a(PQKBWorkID)14981639 035 $a(PQKB)11482836 035 $a(Au-PeEL)EBL1985804 035 $a(CaPaEBR)ebr11092844 035 $a(OCoLC)919344166 035 $a(CaSebORM)9781119028758 035 $a(MiAaPQ)EBC1985804 035 $a(PPN)242965008 035 $a(EXLCZ)993710000000466358 100 $a20150702h20152015 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe Antivirus hacker's handbook /$fJoxean Koret, Elias Bachaalany 205 $aFirst edition. 210 1$aIndianapolis, IN :$cJohn Wiley and Sons,$d[2015] 210 4$dİ2015 215 $a1 online resource (384 p.) 300 $aIncludes index. 311 $a1-119-02875-2 327 $aCover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core 327 $aReverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux 327 $aOther Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams 327 $aChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer 327 $aEvading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses 327 $aUsing Anti-emulation Techniques 330 $aHack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the func 606 $aHackers$vHandbooks, manuals, etc 606 $aComputer viruses$vHandbooks, manuals, etc 615 0$aHackers 615 0$aComputer viruses 676 $a005.84 700 $aKoret$b Joxean$01604566 702 $aBachaalany$b Elias 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910824210803321 996 $aThe Antivirus hacker's handbook$93929481 997 $aUNINA LEADER 01272nam0 22003131i 450 001 UON00233745 005 20231205103514.687 010 $a88-373-0338-6 100 $a20030730d1998 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aCirca la natura della lingua$ei materiali della polizzina autografa del 1827$fGiacomo Leopardi$ga cura di Marcello Andria e Paola Zito$gprefazione di Stefano Gensini 210 $aPalermo$cNovecento$d1998 215 $aLVIII, 308 p.$d20 cm 410 1$1001UON00177248$12001 $aPoetica$1210 $aPalermo$cNovecento 620 $aIT$dPalermo$3UONL000273 676 $a858. 7$cMiscellanea italiana. 1814-1859$v21 700 1$aLEOPARDI$bGiacomo$3UONV042554$0292683 702 1$aANDRIA$bMarcello$3UONV069817 702 1$aGensini$bStefano$3UONV054364 702 1$aZITO$bPaola$3UONV141680 712 $aNovecento$3UONV252231$4650 801 $aIT$bSOL$c20250307$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00233745 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI ITA V 114 $eSI LO 68077 5 114 996 $aCirca la natura della lingua$91232802 997 $aUNIOR LEADER 04649nam 22006975 450 001 9910300201903321 005 20251116140225.0 010 $a3-662-44006-7 024 7 $a10.1007/978-3-662-44006-3 035 $a(CKB)3710000000311667 035 $a(EBL)1965956 035 $a(OCoLC)908084728 035 $a(SSID)ssj0001408201 035 $a(PQKBManifestationID)11773996 035 $a(PQKBTitleCode)TC0001408201 035 $a(PQKBWorkID)11347597 035 $a(PQKB)10243152 035 $a(DE-He213)978-3-662-44006-3 035 $a(MiAaPQ)EBC1965956 035 $a(PPN)183148010 035 $a(EXLCZ)993710000000311667 100 $a20141202d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCancer Immunology $eA Translational Medicine Context /$fedited by Nima Rezaei 205 $a1st ed. 2015. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2015. 215 $a1 online resource (633 p.) 300 $aDescription based upon print version of record. 311 08$a3-662-44005-9 320 $aIncludes bibliographical references and index. 327 $aIntroduction on cancer immunology and immunotherapy -- Inflammatory and innate immune cells in cancer microenvironment and progression -- Role of innate immunity in cancers and antitumor response -- Role of B cells in anti tumor response -- The role of exhaustion in tumor-induced T cell dysfunction in patients with cancer -- Regulatory T cells and Th17 cells in the immunosuppressive tumor network -- Role of cytokines in tumor immunity and immune tolerance to cancers -- Role of chemokines and chemokine receptors in cancers -- The role of Fas and Fas-ligand in cancers -- MHC class I molecules and cancer progression: Lessons learned from preclinical tumor models -- Role of plasmacytoid dendritic cells in cancer -- Cancer immunoediting: immunosurveillance, immuneequilibrium, and immune escape -- Apoptosis, autophagy and necroptosis in Cancer -- Prognostic value of innate and adaptive immunity in cancers -- Epigenetics and Micro RNAs in cancers -- Immunogenetics of cancers -- Immunodeficiencies and cancers -- Immunosenescence and cancers -- Nutrition, immunity and cancers -- Allergies and cancers -- Cancer immunology of transmissible cancers -- Systems biology and systems immunology of cancer -- Principles of immunological diagnostic tests for cancers -- Flow cytometry in cancer immunotherapy: applications, analysis, quality control and future -- Immunohistochemistry of cancers -- Immunology and immunotherapy of graft versus host disease.   . 330 $aCancer Immunology is intended as an up-to-date, clinically relevant review of cancer immunology and immunotherapy. The rapid flow of studies in the field of cancer immunology during the last decade has increased our understanding of the interactions between the immune system and cancerous cells. In particular, it is now well known that such interactions result in the induction of epigenetic changes in cancerous cells and the selection of less immunogenic clones as well as alterations in immune responses. Understanding the cross-talk between nascent transformed cells and cells of the immune system has led to the development of combinatorial immunotherapeutic strategies to combat cancer. This volume is focused on interactions between cancerous cells and various components of the innate and adaptive immune system are fully described. Notably, the principal focus is very much on clinical aspects, the aim being to educate clinicians on the clinical implications of the most recent findings and novel developments in the field. This is to be hoped that this translational book will be comprehensible, cogent and of special value for researchers and clinicians who wish to extend their knowledge on cancer immunology.   . 606 $aInternal medicine 606 $aImmunology 606 $aOncology 606 $aHematology 606 $aInternal Medicine 606 $aImmunology 606 $aOncology 606 $aHematology 615 0$aInternal medicine. 615 0$aImmunology. 615 0$aOncology. 615 0$aHematology. 615 14$aInternal Medicine. 615 24$aImmunology. 615 24$aOncology. 615 24$aHematology. 676 $a610 676 $a616 676 $a616.15 676 $a616079 702 $aRezaei$b Nima$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910300201903321 996 $aCancer Immunology$91760493 997 $aUNINA