2011 6th International Conference on Malicious and Unwanted Software
| 2011 6th International Conference on Malicious and Unwanted Software |
| Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2011 |
| Descrizione fisica | 1 online resource |
| Disciplina | 004.6 |
| Soggetto topico |
Computer networks
Computer viruses |
| ISBN |
9781467300346
1467300349 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910141162503321 |
| [Place of publication not identified], : IEEE, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
| The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany |
| Autore | Koret Joxean |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Indianapolis, IN : , : John Wiley and Sons, , [2015] |
| Descrizione fisica | 1 online resource (384 p.) |
| Disciplina | 005.84 |
| Soggetto topico |
Hackers
Computer viruses |
| ISBN |
1-119-18352-9
1-119-02878-7 1-119-02876-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses Using Anti-emulation Techniques |
| Record Nr. | UNINA-9910131650203321 |
Koret Joxean
|
||
| Indianapolis, IN : , : John Wiley and Sons, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
| The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany |
| Autore | Koret Joxean |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Indianapolis, IN : , : John Wiley and Sons, , [2015] |
| Descrizione fisica | 1 online resource (384 p.) |
| Disciplina | 005.84 |
| Soggetto topico |
Hackers
Computer viruses |
| ISBN |
1-119-18352-9
1-119-02878-7 1-119-02876-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses Using Anti-emulation Techniques |
| Record Nr. | UNINA-9910824210803321 |
Koret Joxean
|
||
| Indianapolis, IN : , : John Wiley and Sons, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Automatic defense against zero-day polymorphic worms in communication networks / / Mohssen Mohammed, Al-Sakib Khan Pathan
| Automatic defense against zero-day polymorphic worms in communication networks / / Mohssen Mohammed, Al-Sakib Khan Pathan |
| Autore | Mohammed Mohssen <1982, > |
| Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2013 |
| Descrizione fisica | 1 online resource (317 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | PathanAl-Sakib Khan |
| Collana | Information security books |
| Soggetto topico |
Computer viruses
Computer algorithms Computer networks - Security measures Machine theory |
| Soggetto genere / forma | Electronic books. |
| ISBN |
0-429-09814-6
1-4822-1905-0 1-4665-5728-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms. |
| Record Nr. | UNINA-9910453014803321 |
Mohammed Mohssen <1982, >
|
||
| Boca Raton, Fla. : , : CRC Press, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Automatic defense against zero-day polymorphic worms in communication networks / / Mohssen Mohammed, Al-Sakib Khan Pathan
| Automatic defense against zero-day polymorphic worms in communication networks / / Mohssen Mohammed, Al-Sakib Khan Pathan |
| Autore | Mohammed Mohssen <1982, > |
| Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2013 |
| Descrizione fisica | 1 online resource (317 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | PathanAl-Sakib Khan |
| Collana | Information security books |
| Soggetto topico |
Computer viruses
Computer algorithms Computer networks - Security measures Machine theory |
| ISBN |
0-429-09814-6
1-4822-1905-0 1-4665-5728-1 |
| Classificazione | COM037000COM051230COM053000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | ch. 1. The fundamental concepts -- ch. 2. Computer networking -- ch. 3. Intrusion detection and prevention systems (IDPSs) -- ch. 4. Honeypots -- ch. 5. Internet worms -- ch. 6. Reading resources on automated signature generation systems -- ch. 7. Signature generation algorithms for polymorphic worms -- ch. 8. Zero-day polymorphic worm collection method -- ch. 9. Developed signature generation algorithms. |
| Record Nr. | UNINA-9910779875903321 |
Mohammed Mohssen <1982, >
|
||
| Boca Raton, Fla. : , : CRC Press, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Border security [[electronic resource] ] : better usage of electronic passport security features could improve fraud detection : report to congressional requesters
| Border security [[electronic resource] ] : better usage of electronic passport security features could improve fraud detection : report to congressional requesters |
| Pubbl/distr/stampa | [Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2010] |
| Descrizione fisica | 1 online resource (ii, 45 pages) : illustrations |
| Soggetto topico |
Passports - United States
Border security - Technological innovations - United States National security - United States Computer viruses Public contracts - United States Letting of contracts - United States |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Border security |
| Record Nr. | UNINA-9910697012603321 |
| [Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2010] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Buffer overflow attacks [electronic resource] : detect, exploit, prevent / James C. Foster ... [et al.] ; foreword by Dave Aitel
| Buffer overflow attacks [electronic resource] : detect, exploit, prevent / James C. Foster ... [et al.] ; foreword by Dave Aitel |
| Pubbl/distr/stampa | Rockland, MA : Syngress, c2005 |
| Descrizione fisica | xxii, 497 p. : ill. ; 23 cm. |
| Disciplina | 005.8 |
| Altri autori (Persone) | Foster, James C. |
| Soggetto topico |
Computer security
Computer viruses |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9781932266672
1932266674 |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Buffers and overflows ; Stack segment ; Attacks on the stack ; Attacks on the heap ; Discovering vulnerabilities ; Crafting a payload ; Attack delivery ; Real world examples ; Trapping attacks ; Preventing attacks ; Defense in depth. |
| Record Nr. | UNISALENTO-991003260139707536 |
| Rockland, MA : Syngress, c2005 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
Como conectarse al Internet de manera segura [[electronic resource] =] : Dialing up to the Internet : how to stay safe online
| Como conectarse al Internet de manera segura [[electronic resource] =] : Dialing up to the Internet : how to stay safe online |
| Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002] |
| Collana | Alerta para consumidores |
| Soggetto topico |
Computer viruses
Hackers Microcomputers - Security measures |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | spa |
| Altri titoli varianti | Dialing up to the Internet : how to stay safe online |
| Record Nr. | UNINA-9910691980103321 |
| [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer viruses and related threats : a management guide / / John P. Wack, Lisa J. Carnahan
| Computer viruses and related threats : a management guide / / John P. Wack, Lisa J. Carnahan |
| Autore | Wack John P |
| Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology |
| Descrizione fisica | 1 online resource (1 volume (various pagings)) |
| Disciplina |
602/.18 s
005.8 |
| Altri autori (Persone) | CarnahanLisa J |
| Collana | NIST special publication |
| Soggetto topico | Computer viruses |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Computer viruses and related threats |
| Record Nr. | UNINA-9910713101403321 |
Wack John P
|
||
| Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Configuring Symantec AntiVirus corporate edition [electronic resource] / Laura E. Hunter ... [et al.] ; Robert J. Shimonski, technical editor
| Configuring Symantec AntiVirus corporate edition [electronic resource] / Laura E. Hunter ... [et al.] ; Robert J. Shimonski, technical editor |
| Pubbl/distr/stampa | Rockland, Mass. : Syngress, c2003 |
| Descrizione fisica | xxxiii, 717 p. : ill. ; 24 cm. |
| Disciplina | 005.8/4 |
| Altri autori (Persone) |
Hunter, Laura E.
Shimonski, Robert |
| Soggetto topico |
Computer viruses
Computer networks - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9781931836814
1931836817 |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1: Introduction -- 2: Centralized AntiVirus Management -- 3: Classifying Malicious Viruses -- 4: Configuring Norton AntiVirus 2.5 for Gateways -- 5: Configuring Norton AntiVirus 2.5 for Microsoftʼ Exchange -- 6: Configuring Norton AntiVirus 2.5 for Lotus Notes / Domino -- 7: Configuring Norton AntiVirus Corporate Edition 7.6 -- 8: Configuring Symantec Web Security 2.0 -- 9: Troubleshooting Symantec AntiVirus Enterprise Edition -- 10: Testing your Deployment -- 11: Securing Workstations -- 12: Updating Your Virus Definitions -- 13: Backup and Disaster Recovery -- 14: Preparing for Symantec Product Specialist Certification -- 15: Conclusion. |
| Altri titoli varianti | Symantec AntiVirus |
| Record Nr. | UNISALENTO-991003258549707536 |
| Rockland, Mass. : Syngress, c2003 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||