The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
| The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany |
| Autore | Koret Joxean |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Indianapolis, IN : , : John Wiley and Sons, , [2015] |
| Descrizione fisica | 1 online resource (384 p.) |
| Disciplina | 005.84 |
| Soggetto topico |
Hackers
Computer viruses |
| ISBN |
1-119-18352-9
1-119-02878-7 1-119-02876-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses Using Anti-emulation Techniques |
| Record Nr. | UNINA-9910131650203321 |
Koret Joxean
|
||
| Indianapolis, IN : , : John Wiley and Sons, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
| The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany |
| Autore | Koret Joxean |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Indianapolis, IN : , : John Wiley and Sons, , [2015] |
| Descrizione fisica | 1 online resource (384 p.) |
| Disciplina | 005.84 |
| Soggetto topico |
Hackers
Computer viruses |
| ISBN |
1-119-18352-9
1-119-02878-7 1-119-02876-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses Using Anti-emulation Techniques |
| Record Nr. | UNINA-9910824210803321 |
Koret Joxean
|
||
| Indianapolis, IN : , : John Wiley and Sons, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Bens Fukushima : Roman / / Thomas Rüst
| Bens Fukushima : Roman / / Thomas Rüst |
| Autore | Rust Thomas |
| Pubbl/distr/stampa | Zürich, [Switzerland] : , : edition 8, , 2014 |
| Descrizione fisica | 1 online resource (441 pages) |
| Disciplina | 813.54 |
| Soggetto topico |
Whistle blowing
Fukushima Nuclear Disaster, Japan, 2011 Leaks (Disclosure of information) Hackers |
| ISBN | 3-85990-225-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | ger |
| Record Nr. | UNINA-9910153459603321 |
Rust Thomas
|
||
| Zürich, [Switzerland] : , : edition 8, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Betrayed : the Nicole Jones series / / Karen E. Olson
| Betrayed : the Nicole Jones series / / Karen E. Olson |
| Autore | Olson Karen E. |
| Pubbl/distr/stampa | Sutton, England : , : Severn House, , 2016 |
| Descrizione fisica | 1 online resource (217 pages) |
| Disciplina | 813.6 |
| Collana | A Black Hat Thriller |
| Soggetto topico |
Hackers
Secrecy |
| ISBN | 1-78010-853-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Intro -- Contents -- A Selection of Recent Titles by Karen E. Olson -- Title Page -- Copyright -- Prologue -- Chapter One -- Chapter Two -- Chapter Three -- Chapter Four -- Chapter Five -- Chapter Six -- Chapter Seven -- Chapter Eight -- Chapter Nine -- Chapter Ten -- Chapter Eleven -- Chapter Twelve -- Chapter Thirteen -- Chapter Fourteen -- Chapter Fifteen -- Chapter Sixteen -- Chapter Seventeen -- Chapter Eighteen -- Chapter Nineteen -- Chapter Twenty -- Chapter Twenty-One -- Chapter Twenty-Two -- Chapter Twenty-Three -- Chapter Twenty-Four -- Chapter Twenty-Five -- Chapter Twenty-Six -- Chapter Twenty-Seven -- Chapter Twenty-Eight -- Chapter Twenty-Nine -- Chapter Thirty -- Chapter Thirty-One -- Chapter Thirty-Two -- Chapter Thirty-Three -- Chapter Thirty-Four -- Chapter Thirty-Five -- Chapter Thirty-Six -- Chapter Thirty-Seven -- Chapter Thirty-Eight -- Chapter Thirty-Nine -- Chapter Forty -- Chapter Forty-One -- Chapter Forty-Two -- Chapter Forty-Three -- Chapter Forty-Four -- Chapter Forty-Five -- Chapter Forty-Six -- Chapter Forty-Seven -- Chapter Forty-Eight -- Chapter Forty-Nine -- Chapter Fifty -- Chapter Fifty-One -- Chapter Fifty-Two -- Epilogue -- Acknowledgments. |
| Record Nr. | UNINA-9910162702203321 |
Olson Karen E.
|
||
| Sutton, England : , : Severn House, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Botnets and hackers and spam (oh, my!) [[electronic resource]]
| Botnets and hackers and spam (oh, my!) [[electronic resource]] |
| Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, , [2007] |
| Descrizione fisica | 2 unnumbered pages : digital, PDF file |
| Collana | FTC consumer alert |
| Soggetto topico |
Computers - Access control
Hackers Spam (Electronic mail) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Botnets and hackers and spam |
| Record Nr. | UNINA-9910697519003321 |
| [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, , [2007] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing / / Ahmed Sheikh
| Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing / / Ahmed Sheikh |
| Autore | Sheikh Ahmed |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress, , [2021] |
| Descrizione fisica | 1 online resource (217 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security - Examinations
Hackers |
| ISBN | 1-4842-7258-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910735396603321 |
Sheikh Ahmed
|
||
| Berkeley, CA : , : Apress, , [2021] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Como conectarse al Internet de manera segura [[electronic resource] =] : Dialing up to the Internet : how to stay safe online
| Como conectarse al Internet de manera segura [[electronic resource] =] : Dialing up to the Internet : how to stay safe online |
| Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002] |
| Collana | Alerta para consumidores |
| Soggetto topico |
Computer viruses
Hackers Microcomputers - Security measures |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | spa |
| Altri titoli varianti | Dialing up to the Internet : how to stay safe online |
| Record Nr. | UNINA-9910691980103321 |
| [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Defense against the black arts : how hackers do what they do and how to protect against it / / Jesse Varsalone, Matthew McFadden
| Defense against the black arts : how hackers do what they do and how to protect against it / / Jesse Varsalone, Matthew McFadden |
| Autore | Varsalone Jesse |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Boca Raton, FL : , : Auerbach Publications, , [2017] |
| Descrizione fisica | 1 online resource (408 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Hackers
Computer networks - Security measures Computer security |
| ISBN |
9786613350077
9780429103766 042910376X 9781283350075 1283350076 9781439821220 1439821224 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover |
| Altri titoli varianti | Defense against the Black Arts |
| Record Nr. | UNINA-9910410652903321 |
Varsalone Jesse
|
||
| Boca Raton, FL : , : Auerbach Publications, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Dialing up to the Internet [[electronic resource] ] : how to stay safe online
| Dialing up to the Internet [[electronic resource] ] : how to stay safe online |
| Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002] |
| Collana | FTC consumer alert |
| Soggetto topico |
Computer viruses
Hackers Microcomputers - Security measures |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Dialing up to the Internet |
| Record Nr. | UNINA-9910695516703321 |
| [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Dissecting the hack : the V3rb0ten network / / Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin ; contributors, Brittney Jordan [and five others]
| Dissecting the hack : the V3rb0ten network / / Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin ; contributors, Brittney Jordan [and five others] |
| Autore | Street Jayson E. |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam, Netherlands : , : Syngress, , 2015 |
| Descrizione fisica | 1 online resource (306 p.) |
| Disciplina | 364.168 |
| Soggetto topico |
Computer crimes
Computer crimes - Investigation Computer networks - Security measures Computer security Hackers |
| ISBN | 0-12-804282-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Dissecting the Hack; Copyright Page; Dedication; Contents; List of Contributors; About the Authors; Foreword; Acknowledgments; About the Book; 1 The V3rb0t3n Network; Prologue; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Chapter 11; Epilogue; 2 Interview Interlude; Adam Laurie Co-Founder and Director of Aperture Labs Ltd.; Thomas Lim Founder and CEO of COSEINC; Josh Thomas Chief Breaker & Partner at Atredis Partners; 3 Star; Radio Frequency Identification (RFID); BitCoin and Digital Currency; Steganography
SSL EncryptionAdvanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Malware Communications; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance; 3D Printers; Maltego; ROT13; Wickr; Pastebin; Women in Technology; Pirate Party; magicJack; Firewalls; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Spaces; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; BruCON; 44Con; OPSEC Pentesting HardwareAnonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings; Hackers for Charity; Endnotes; Radio Frequency Identification (RFID); BitCoin and Digital Currency; Steganography; SSL Encryption; Advanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance 3D Printer AttacksROT13; Wickr; Pastebin; Women in Technology; Pirate Party; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; OPSEC; Pentesting Hardware; Anonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings |
| Record Nr. | UNINA-9910797485803321 |
Street Jayson E.
|
||
| Amsterdam, Netherlands : , : Syngress, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||