Android malware / / Xuxian Jiang, Yajin Zhou
| Android malware / / Xuxian Jiang, Yajin Zhou |
| Autore | Jiang Xuxian |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | New York, : Springer, c2013 |
| Descrizione fisica | 1 online resource (xi, 44 pages) : illustrations (chiefly color) |
| Disciplina | 005.84 |
| Collana | SpringerBriefs in computer science |
| Soggetto topico |
Malware (Computer software)
Computer science Data protection Data encryption (Computer science) |
| ISBN | 1-4614-7394-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- A Survey of Android Malware -- Case Studies -- Discussion -- Additional Reading -- Summary. |
| Record Nr. | UNINA-9910437959003321 |
Jiang Xuxian
|
||
| New York, : Springer, c2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
| The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany |
| Autore | Koret Joxean |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Indianapolis, IN : , : John Wiley and Sons, , [2015] |
| Descrizione fisica | 1 online resource (384 p.) |
| Disciplina | 005.84 |
| Soggetto topico |
Hackers
Computer viruses |
| ISBN |
1-119-18352-9
1-119-02878-7 1-119-02876-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses Using Anti-emulation Techniques |
| Record Nr. | UNINA-9910131650203321 |
Koret Joxean
|
||
| Indianapolis, IN : , : John Wiley and Sons, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
| The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany |
| Autore | Koret Joxean |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Indianapolis, IN : , : John Wiley and Sons, , [2015] |
| Descrizione fisica | 1 online resource (384 p.) |
| Disciplina | 005.84 |
| Soggetto topico |
Hackers
Computer viruses |
| ISBN |
1-119-18352-9
1-119-02878-7 1-119-02876-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses Using Anti-emulation Techniques |
| Record Nr. | UNINA-9910824210803321 |
Koret Joxean
|
||
| Indianapolis, IN : , : John Wiley and Sons, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory / / Michael Hale Ligh [and four others]
| The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory / / Michael Hale Ligh [and four others] |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2014 |
| Descrizione fisica | xxiii, 886p. ; : ill |
| Disciplina | 005.84 |
| Soggetto topico |
Malware (Computer software)
Computer security |
| ISBN | 9781118825044 : (ebk : EbookCentral) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910786622903321 |
| Indianapolis, Indiana : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory / / Michael Hale Ligh [and four others]
| The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory / / Michael Hale Ligh [and four others] |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2014 |
| Descrizione fisica | xxiii, 886p. ; : ill |
| Disciplina | 005.84 |
| Soggetto topico |
Malware (Computer software)
Computer security |
| ISBN | 9781118825044 : (ebk : EbookCentral) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910824452103321 |
| Indianapolis, Indiana : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Botnets / / Heli Tiirmaa-Klaar ... [et al.]
| Botnets / / Heli Tiirmaa-Klaar ... [et al.] |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | New York, : Springer, 2013 |
| Descrizione fisica | 1 online resource (viii, 97 pages) : illustrations (some color) |
| Disciplina | 005.84 |
| Altri autori (Persone) | Tiirmaa-KlaarHeli |
| Collana | SpringerBriefs in cybersecurity |
| Soggetto topico |
Malware (Computer software)
Computer security |
| ISBN | 1-4471-5216-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Foreword -- Botnets, Cybercrime and National Security -- Botnets: How to Fight the Ever-growing Threat on a Technical Level. |
| Record Nr. | UNINA-9910437564503321 |
| New York, : Springer, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
E-mail virus protection handbook [electronic resource]
| E-mail virus protection handbook [electronic resource] |
| Pubbl/distr/stampa | Rockland, Md. ; [Great Britain] : Syngress, 2000 |
| Descrizione fisica | xxvii, 476 p. : ill. ; 24 cm. |
| Disciplina | 005.84 |
| Altri autori (Enti) | Syngress Media, Inc. |
| Soggetto topico |
Electronic mail systems - Security measures
Computer viruses |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9781928994237
1928994237 |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISALENTO-991003252569707536 |
| Rockland, Md. ; [Great Britain] : Syngress, 2000 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
Hacking : the next generation / Nitesh Dhanjani, Billy Rios, and Brett Hardin
| Hacking : the next generation / Nitesh Dhanjani, Billy Rios, and Brett Hardin |
| Autore | Dhanjani, Nitesh |
| Pubbl/distr/stampa | Beijing : O'Reilly, c2009 |
| Descrizione fisica | xiii, 279 p. : ill. ; 24 cm |
| Disciplina | 005.84 |
| Altri autori (Persone) |
Rios, Billyauthor
Hardin, Brett |
| Soggetto topico |
Computer security
Internet - Security measures |
| ISBN | 9780596154578 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Intelligence gathering: peering through the windows to your organization -- Inside-out attaks: the attacker is the intruder - The way it works: there is no patch -- Blended threats: when applications exploit each other -- Closed insecurity: sharing the cloud with your enemy -- Abusing mobile devices: targeting your mobile workforce -- Infiltrating the phishing underground: learning from online criminals? -- Influencing your victims: do what we tell you, please -- Hacking executives: can your CEO spot a targeted attack -- Case studies: different perspectives |
| Record Nr. | UNISALENTO-991001506509707536 |
Dhanjani, Nitesh
|
||
| Beijing : O'Reilly, c2009 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
Java for android / / Budi Kurniawan ; technical reviewer, Paul Deck ; indexer, Chris Mayle
| Java for android / / Budi Kurniawan ; technical reviewer, Paul Deck ; indexer, Chris Mayle |
| Autore | Kurniawan Budi |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | [Vancouver, Canada] : , : Brainy Software, , 2014 |
| Descrizione fisica | 1 online resource (567 pages) : color illustrations, photographs |
| Disciplina | 005.84 |
| Soggetto topico |
Android (Electronic resource)
Java (Computer program language) Application software - Development |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-77197-006-5
0-9921330-3-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910460048603321 |
Kurniawan Budi
|
||
| [Vancouver, Canada] : , : Brainy Software, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Java for android / / Budi Kurniawan ; technical reviewer, Paul Deck ; indexer, Chris Mayle
| Java for android / / Budi Kurniawan ; technical reviewer, Paul Deck ; indexer, Chris Mayle |
| Autore | Kurniawan Budi |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | [Vancouver, Canada] : , : Brainy Software, , 2014 |
| Descrizione fisica | 1 online resource (567 pages) : color illustrations, photographs |
| Disciplina | 005.84 |
| Soggetto topico |
Android (Electronic resource)
Java (Computer program language) Application software - Development |
| ISBN |
1-77197-006-5
0-9921330-3-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910787043303321 |
Kurniawan Budi
|
||
| [Vancouver, Canada] : , : Brainy Software, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||