top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Android malware / / Xuxian Jiang, Yajin Zhou
Android malware / / Xuxian Jiang, Yajin Zhou
Autore Jiang Xuxian
Edizione [1st ed. 2013.]
Pubbl/distr/stampa New York, : Springer, c2013
Descrizione fisica 1 online resource (xi, 44 pages) : illustrations (chiefly color)
Disciplina 005.84
Collana SpringerBriefs in computer science
Soggetto topico Malware (Computer software)
Computer science
Data protection
Data encryption (Computer science)
ISBN 1-4614-7394-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- A Survey of Android Malware -- Case Studies -- Discussion -- Additional Reading -- Summary.
Record Nr. UNINA-9910437959003321
Jiang Xuxian  
New York, : Springer, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
Autore Koret Joxean
Edizione [First edition.]
Pubbl/distr/stampa Indianapolis, IN : , : John Wiley and Sons, , [2015]
Descrizione fisica 1 online resource (384 p.)
Disciplina 005.84
Soggetto topico Hackers
Computer viruses
ISBN 1-119-18352-9
1-119-02878-7
1-119-02876-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux
Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams
ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer
Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses
Using Anti-emulation Techniques
Record Nr. UNINA-9910131650203321
Koret Joxean  
Indianapolis, IN : , : John Wiley and Sons, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
Autore Koret Joxean
Edizione [First edition.]
Pubbl/distr/stampa Indianapolis, IN : , : John Wiley and Sons, , [2015]
Descrizione fisica 1 online resource (384 p.)
Disciplina 005.84
Soggetto topico Hackers
Computer viruses
ISBN 1-119-18352-9
1-119-02878-7
1-119-02876-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux
Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams
ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer
Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses
Using Anti-emulation Techniques
Record Nr. UNINA-9910824210803321
Koret Joxean  
Indianapolis, IN : , : John Wiley and Sons, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory / / Michael Hale Ligh [and four others]
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory / / Michael Hale Ligh [and four others]
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica xxiii, 886p. ; : ill
Disciplina 005.84
Soggetto topico Malware (Computer software)
Computer security
ISBN 9781118825044 : (ebk : EbookCentral)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910786622903321
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory / / Michael Hale Ligh [and four others]
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac Memory / / Michael Hale Ligh [and four others]
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica xxiii, 886p. ; : ill
Disciplina 005.84
Soggetto topico Malware (Computer software)
Computer security
ISBN 9781118825044 : (ebk : EbookCentral)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910824452103321
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Botnets / / Heli Tiirmaa-Klaar ... [et al.]
Botnets / / Heli Tiirmaa-Klaar ... [et al.]
Edizione [1st ed. 2013.]
Pubbl/distr/stampa New York, : Springer, 2013
Descrizione fisica 1 online resource (viii, 97 pages) : illustrations (some color)
Disciplina 005.84
Altri autori (Persone) Tiirmaa-KlaarHeli
Collana SpringerBriefs in cybersecurity
Soggetto topico Malware (Computer software)
Computer security
ISBN 1-4471-5216-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- Botnets, Cybercrime and National Security -- Botnets: How to Fight the Ever-growing Threat on a Technical Level.
Record Nr. UNINA-9910437564503321
New York, : Springer, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
E-mail virus protection handbook [electronic resource]
E-mail virus protection handbook [electronic resource]
Pubbl/distr/stampa Rockland, Md. ; [Great Britain] : Syngress, 2000
Descrizione fisica xxvii, 476 p. : ill. ; 24 cm.
Disciplina 005.84
Altri autori (Enti) Syngress Media, Inc.
Soggetto topico Electronic mail systems - Security measures
Computer viruses
Soggetto genere / forma Electronic books.
ISBN 9781928994237
1928994237
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISALENTO-991003252569707536
Rockland, Md. ; [Great Britain] : Syngress, 2000
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Hacking : the next generation / Nitesh Dhanjani, Billy Rios, and Brett Hardin
Hacking : the next generation / Nitesh Dhanjani, Billy Rios, and Brett Hardin
Autore Dhanjani, Nitesh
Pubbl/distr/stampa Beijing : O'Reilly, c2009
Descrizione fisica xiii, 279 p. : ill. ; 24 cm
Disciplina 005.84
Altri autori (Persone) Rios, Billyauthor
Hardin, Brett
Soggetto topico Computer security
Internet - Security measures
ISBN 9780596154578
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intelligence gathering: peering through the windows to your organization -- Inside-out attaks: the attacker is the intruder - The way it works: there is no patch -- Blended threats: when applications exploit each other -- Closed insecurity: sharing the cloud with your enemy -- Abusing mobile devices: targeting your mobile workforce -- Infiltrating the phishing underground: learning from online criminals? -- Influencing your victims: do what we tell you, please -- Hacking executives: can your CEO spot a targeted attack -- Case studies: different perspectives
Record Nr. UNISALENTO-991001506509707536
Dhanjani, Nitesh  
Beijing : O'Reilly, c2009
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Java for android / / Budi Kurniawan ; technical reviewer, Paul Deck ; indexer, Chris Mayle
Java for android / / Budi Kurniawan ; technical reviewer, Paul Deck ; indexer, Chris Mayle
Autore Kurniawan Budi
Edizione [First edition.]
Pubbl/distr/stampa [Vancouver, Canada] : , : Brainy Software, , 2014
Descrizione fisica 1 online resource (567 pages) : color illustrations, photographs
Disciplina 005.84
Soggetto topico Android (Electronic resource)
Java (Computer program language)
Application software - Development
Soggetto genere / forma Electronic books.
ISBN 1-77197-006-5
0-9921330-3-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910460048603321
Kurniawan Budi  
[Vancouver, Canada] : , : Brainy Software, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Java for android / / Budi Kurniawan ; technical reviewer, Paul Deck ; indexer, Chris Mayle
Java for android / / Budi Kurniawan ; technical reviewer, Paul Deck ; indexer, Chris Mayle
Autore Kurniawan Budi
Edizione [First edition.]
Pubbl/distr/stampa [Vancouver, Canada] : , : Brainy Software, , 2014
Descrizione fisica 1 online resource (567 pages) : color illustrations, photographs
Disciplina 005.84
Soggetto topico Android (Electronic resource)
Java (Computer program language)
Application software - Development
ISBN 1-77197-006-5
0-9921330-3-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910787043303321
Kurniawan Budi  
[Vancouver, Canada] : , : Brainy Software, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui