top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
Autore Koret Joxean
Edizione [First edition.]
Pubbl/distr/stampa Indianapolis, IN : , : John Wiley and Sons, , [2015]
Descrizione fisica 1 online resource (384 p.)
Disciplina 005.84
Soggetto topico Hackers
Computer viruses
ISBN 1-119-18352-9
1-119-02878-7
1-119-02876-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux
Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams
ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer
Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses
Using Anti-emulation Techniques
Record Nr. UNINA-9910131650203321
Koret Joxean  
Indianapolis, IN : , : John Wiley and Sons, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
Autore Koret Joxean
Edizione [First edition.]
Pubbl/distr/stampa Indianapolis, IN : , : John Wiley and Sons, , [2015]
Descrizione fisica 1 online resource (384 p.)
Disciplina 005.84
Soggetto topico Hackers
Computer viruses
ISBN 1-119-18352-9
1-119-02878-7
1-119-02876-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux
Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams
ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer
Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses
Using Anti-emulation Techniques
Record Nr. UNINA-9910824210803321
Koret Joxean  
Indianapolis, IN : , : John Wiley and Sons, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bens Fukushima : Roman / / Thomas Rüst
Bens Fukushima : Roman / / Thomas Rüst
Autore Rust Thomas
Pubbl/distr/stampa Zürich, [Switzerland] : , : edition 8, , 2014
Descrizione fisica 1 online resource (441 pages)
Disciplina 813.54
Soggetto topico Whistle blowing
Fukushima Nuclear Disaster, Japan, 2011
Leaks (Disclosure of information)
Hackers
ISBN 3-85990-225-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Record Nr. UNINA-9910153459603321
Rust Thomas  
Zürich, [Switzerland] : , : edition 8, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Betrayed : the Nicole Jones series / / Karen E. Olson
Betrayed : the Nicole Jones series / / Karen E. Olson
Autore Olson Karen E.
Pubbl/distr/stampa Sutton, England : , : Severn House, , 2016
Descrizione fisica 1 online resource (217 pages)
Disciplina 813.6
Collana A Black Hat Thriller
Soggetto topico Hackers
Secrecy
ISBN 1-78010-853-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- A Selection of Recent Titles by Karen E. Olson -- Title Page -- Copyright -- Prologue -- Chapter One -- Chapter Two -- Chapter Three -- Chapter Four -- Chapter Five -- Chapter Six -- Chapter Seven -- Chapter Eight -- Chapter Nine -- Chapter Ten -- Chapter Eleven -- Chapter Twelve -- Chapter Thirteen -- Chapter Fourteen -- Chapter Fifteen -- Chapter Sixteen -- Chapter Seventeen -- Chapter Eighteen -- Chapter Nineteen -- Chapter Twenty -- Chapter Twenty-One -- Chapter Twenty-Two -- Chapter Twenty-Three -- Chapter Twenty-Four -- Chapter Twenty-Five -- Chapter Twenty-Six -- Chapter Twenty-Seven -- Chapter Twenty-Eight -- Chapter Twenty-Nine -- Chapter Thirty -- Chapter Thirty-One -- Chapter Thirty-Two -- Chapter Thirty-Three -- Chapter Thirty-Four -- Chapter Thirty-Five -- Chapter Thirty-Six -- Chapter Thirty-Seven -- Chapter Thirty-Eight -- Chapter Thirty-Nine -- Chapter Forty -- Chapter Forty-One -- Chapter Forty-Two -- Chapter Forty-Three -- Chapter Forty-Four -- Chapter Forty-Five -- Chapter Forty-Six -- Chapter Forty-Seven -- Chapter Forty-Eight -- Chapter Forty-Nine -- Chapter Fifty -- Chapter Fifty-One -- Chapter Fifty-Two -- Epilogue -- Acknowledgments.
Record Nr. UNINA-9910162702203321
Olson Karen E.  
Sutton, England : , : Severn House, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Biohackers : the politics of open science / / Alessandro Delfanti
Biohackers : the politics of open science / / Alessandro Delfanti
Autore Delfanti Alessandro
Edizione [1st ed.]
Pubbl/distr/stampa London, : Pluto Press, 2013
Descrizione fisica 1 online resource (176 p.)
Disciplina 303.4834
Soggetto topico Hackers
Computer networks - Security measures
Computer security
ISBN 1-84964-907-3
1-84964-906-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Contents -- Preface -- 1. Cracking Codes, Remixing Cultures -- 2. Forbidden, Public, Enclosed, Open Science -- 3. Hackers, Rebels and Profiteers -- 4. Sailing and Sequencing the Genome Seas -- 5. Just Another Rebel Scientist -- 6. We are the Biohackers -- 7. Conclusion: How to Hack Biology -- Notes -- Bibliography -- Index.
Record Nr. UNINA-9910808638303321
Delfanti Alessandro  
London, : Pluto Press, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Botnets and hackers and spam (oh, my!) [[electronic resource]]
Botnets and hackers and spam (oh, my!) [[electronic resource]]
Pubbl/distr/stampa [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, , [2007]
Descrizione fisica 2 unnumbered pages : digital, PDF file
Collana FTC consumer alert
Soggetto topico Computers - Access control
Hackers
Spam (Electronic mail)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Botnets and hackers and spam
Record Nr. UNINA-9910697519003321
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing / / Ahmed Sheikh
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing / / Ahmed Sheikh
Autore Sheikh Ahmed
Pubbl/distr/stampa Berkeley, CA : , : Apress, , [2021]
Descrizione fisica 1 online resource (217 pages)
Disciplina 005.8
Soggetto topico Computer security - Examinations
Hackers
ISBN 1-4842-7258-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910735396603321
Sheikh Ahmed  
Berkeley, CA : , : Apress, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Como conectarse al Internet de manera segura [[electronic resource] =] : Dialing up to the Internet : how to stay safe online
Como conectarse al Internet de manera segura [[electronic resource] =] : Dialing up to the Internet : how to stay safe online
Pubbl/distr/stampa [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002]
Collana Alerta para consumidores
Soggetto topico Computer viruses
Hackers
Microcomputers - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione spa
Altri titoli varianti Dialing up to the Internet : how to stay safe online
Record Nr. UNINA-9910691980103321
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Dear hacker : letters to the editor of 2600 / / Emmanuel Goldstein
Dear hacker : letters to the editor of 2600 / / Emmanuel Goldstein
Autore Goldstein Emmanuel J
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., Inc., 2010
Descrizione fisica 1 online resource (579 pages)
Disciplina 005.8
Soggetto topico Computer security
Hackers
ISBN 0-470-88978-0
1-282-68439-6
9786612684395
0-470-89020-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Dear Hacker: Letters to the Editor of 2600; About the Author; Contents; Introduction; Chapter 1: Question Upon Question; Chapter 2: Tales from the Retail Front; Chapter 3: The Challenges of Life as a Hacker; Chapter 4: Technology; Chapter 5: The Magic of the Corporate World; Chapter 6: Our Biggest Fans; Chapter 7: Behind the Walls; Chapter 8: A Culture of Rebels; Chapter 9: Strange Ramblings; Index
Record Nr. UNINA-9910821097903321
Goldstein Emmanuel J  
Indianapolis, Ind., : Wiley Pub., Inc., 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Defense against the black arts : how hackers do what they do and how to protect against it / / Jesse Varsalone, Matthew McFadden
Defense against the black arts : how hackers do what they do and how to protect against it / / Jesse Varsalone, Matthew McFadden
Autore Varsalone Jesse
Edizione [1st ed.]
Pubbl/distr/stampa Boca Raton, FL : , : Auerbach Publications, , [2017]
Descrizione fisica 1 online resource (408 p.)
Disciplina 005.8
Soggetto topico Hackers
Computer networks - Security measures
Computer security
ISBN 0-429-10376-X
1-283-35007-6
9786613350077
1-4398-2122-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover
Altri titoli varianti Defense against the Black Arts
Record Nr. UNINA-9910410652903321
Varsalone Jesse  
Boca Raton, FL : , : Auerbach Publications, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui