top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2011 6th International Conference on Malicious and Unwanted Software
2011 6th International Conference on Malicious and Unwanted Software
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2011
Descrizione fisica 1 online resource
Disciplina 004.6
Soggetto topico Computer networks
Computer viruses
ISBN 9781467300346
1467300349
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910141162503321
[Place of publication not identified], : IEEE, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
Autore Koret Joxean
Edizione [First edition.]
Pubbl/distr/stampa Indianapolis, IN : , : John Wiley and Sons, , [2015]
Descrizione fisica 1 online resource (384 p.)
Disciplina 005.84
Soggetto topico Hackers
Computer viruses
ISBN 1-119-18352-9
1-119-02878-7
1-119-02876-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux
Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams
ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer
Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses
Using Anti-emulation Techniques
Record Nr. UNINA-9910131650203321
Koret Joxean  
Indianapolis, IN : , : John Wiley and Sons, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
Autore Koret Joxean
Edizione [First edition.]
Pubbl/distr/stampa Indianapolis, IN : , : John Wiley and Sons, , [2015]
Descrizione fisica 1 online resource (384 p.)
Disciplina 005.84
Soggetto topico Hackers
Computer viruses
ISBN 1-119-18352-9
1-119-02878-7
1-119-02876-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux
Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams
ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer
Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses
Using Anti-emulation Techniques
Record Nr. UNINA-9910824210803321
Koret Joxean  
Indianapolis, IN : , : John Wiley and Sons, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Automatic defense against zero-day polymorphic worms in communication networks / / Mohssen Mohammed, Al-Sakib Khan Pathan
Automatic defense against zero-day polymorphic worms in communication networks / / Mohssen Mohammed, Al-Sakib Khan Pathan
Autore Mohammed Mohssen <1982, >
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2013
Descrizione fisica 1 online resource (317 p.)
Disciplina 005.8
Altri autori (Persone) PathanAl-Sakib Khan
Collana Information security books
Soggetto topico Computer viruses
Computer algorithms
Computer networks - Security measures
Machine theory
Soggetto genere / forma Electronic books.
ISBN 0-429-09814-6
1-4822-1905-0
1-4665-5728-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.
Record Nr. UNINA-9910453014803321
Mohammed Mohssen <1982, >  
Boca Raton, Fla. : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Automatic defense against zero-day polymorphic worms in communication networks / / Mohssen Mohammed, Al-Sakib Khan Pathan
Automatic defense against zero-day polymorphic worms in communication networks / / Mohssen Mohammed, Al-Sakib Khan Pathan
Autore Mohammed Mohssen <1982, >
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2013
Descrizione fisica 1 online resource (317 p.)
Disciplina 005.8
Altri autori (Persone) PathanAl-Sakib Khan
Collana Information security books
Soggetto topico Computer viruses
Computer algorithms
Computer networks - Security measures
Machine theory
ISBN 0-429-09814-6
1-4822-1905-0
1-4665-5728-1
Classificazione COM037000COM051230COM053000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms.
Record Nr. UNINA-9910779875903321
Mohammed Mohssen <1982, >  
Boca Raton, Fla. : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Border security [[electronic resource] ] : better usage of electronic passport security features could improve fraud detection : report to congressional requesters
Border security [[electronic resource] ] : better usage of electronic passport security features could improve fraud detection : report to congressional requesters
Pubbl/distr/stampa [Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2010]
Descrizione fisica 1 online resource (ii, 45 pages) : illustrations
Soggetto topico Passports - United States
Border security - Technological innovations - United States
National security - United States
Computer viruses
Public contracts - United States
Letting of contracts - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Border security
Record Nr. UNINA-9910697012603321
[Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2010]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Buffer overflow attacks [electronic resource] : detect, exploit, prevent / James C. Foster ... [et al.] ; foreword by Dave Aitel
Buffer overflow attacks [electronic resource] : detect, exploit, prevent / James C. Foster ... [et al.] ; foreword by Dave Aitel
Pubbl/distr/stampa Rockland, MA : Syngress, c2005
Descrizione fisica xxii, 497 p. : ill. ; 23 cm.
Disciplina 005.8
Altri autori (Persone) Foster, James C.
Soggetto topico Computer security
Computer viruses
Soggetto genere / forma Electronic books.
ISBN 9781932266672
1932266674
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Buffers and overflows ; Stack segment ; Attacks on the stack ; Attacks on the heap ; Discovering vulnerabilities ; Crafting a payload ; Attack delivery ; Real world examples ; Trapping attacks ; Preventing attacks ; Defense in depth.
Record Nr. UNISALENTO-991003260139707536
Rockland, MA : Syngress, c2005
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Como conectarse al Internet de manera segura [[electronic resource] =] : Dialing up to the Internet : how to stay safe online
Como conectarse al Internet de manera segura [[electronic resource] =] : Dialing up to the Internet : how to stay safe online
Pubbl/distr/stampa [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002]
Collana Alerta para consumidores
Soggetto topico Computer viruses
Hackers
Microcomputers - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione spa
Altri titoli varianti Dialing up to the Internet : how to stay safe online
Record Nr. UNINA-9910691980103321
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer viruses and related threats : a management guide / / John P. Wack, Lisa J. Carnahan
Computer viruses and related threats : a management guide / / John P. Wack, Lisa J. Carnahan
Autore Wack John P
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology
Descrizione fisica 1 online resource (1 volume (various pagings))
Disciplina 602/.18 s
005.8
Altri autori (Persone) CarnahanLisa J
Collana NIST special publication
Soggetto topico Computer viruses
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Computer viruses and related threats
Record Nr. UNINA-9910713101403321
Wack John P  
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Configuring Symantec AntiVirus corporate edition [electronic resource] / Laura E. Hunter ... [et al.] ; Robert J. Shimonski, technical editor
Configuring Symantec AntiVirus corporate edition [electronic resource] / Laura E. Hunter ... [et al.] ; Robert J. Shimonski, technical editor
Pubbl/distr/stampa Rockland, Mass. : Syngress, c2003
Descrizione fisica xxxiii, 717 p. : ill. ; 24 cm.
Disciplina 005.8/4
Altri autori (Persone) Hunter, Laura E.
Shimonski, Robert
Soggetto topico Computer viruses
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 9781931836814
1931836817
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1: Introduction -- 2: Centralized AntiVirus Management -- 3: Classifying Malicious Viruses -- 4: Configuring Norton AntiVirus 2.5 for Gateways -- 5: Configuring Norton AntiVirus 2.5 for Microsoftʼ Exchange -- 6: Configuring Norton AntiVirus 2.5 for Lotus Notes / Domino -- 7: Configuring Norton AntiVirus Corporate Edition 7.6 -- 8: Configuring Symantec Web Security 2.0 -- 9: Troubleshooting Symantec AntiVirus Enterprise Edition -- 10: Testing your Deployment -- 11: Securing Workstations -- 12: Updating Your Virus Definitions -- 13: Backup and Disaster Recovery -- 14: Preparing for Symantec Product Specialist Certification -- 15: Conclusion.
Altri titoli varianti Symantec AntiVirus
Record Nr. UNISALENTO-991003258549707536
Rockland, Mass. : Syngress, c2003
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui