The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany |
Autore | Koret Joxean |
Edizione | [First edition.] |
Pubbl/distr/stampa | Indianapolis, IN : , : John Wiley and Sons, , [2015] |
Descrizione fisica | 1 online resource (384 p.) |
Disciplina | 005.84 |
Soggetto topico |
Hackers
Computer viruses |
ISBN |
1-119-18352-9
1-119-02878-7 1-119-02876-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses Using Anti-emulation Techniques |
Record Nr. | UNINA-9910131650203321 |
Koret Joxean
![]() |
||
Indianapolis, IN : , : John Wiley and Sons, , [2015] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany |
Autore | Koret Joxean |
Edizione | [First edition.] |
Pubbl/distr/stampa | Indianapolis, IN : , : John Wiley and Sons, , [2015] |
Descrizione fisica | 1 online resource (384 p.) |
Disciplina | 005.84 |
Soggetto topico |
Hackers
Computer viruses |
ISBN |
1-119-18352-9
1-119-02878-7 1-119-02876-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses Using Anti-emulation Techniques |
Record Nr. | UNINA-9910824210803321 |
Koret Joxean
![]() |
||
Indianapolis, IN : , : John Wiley and Sons, , [2015] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Bens Fukushima : Roman / / Thomas Rüst |
Autore | Rust Thomas |
Pubbl/distr/stampa | Zürich, [Switzerland] : , : edition 8, , 2014 |
Descrizione fisica | 1 online resource (441 pages) |
Disciplina | 813.54 |
Soggetto topico |
Whistle blowing
Fukushima Nuclear Disaster, Japan, 2011 Leaks (Disclosure of information) Hackers |
ISBN | 3-85990-225-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Record Nr. | UNINA-9910153459603321 |
Rust Thomas
![]() |
||
Zürich, [Switzerland] : , : edition 8, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Betrayed : the Nicole Jones series / / Karen E. Olson |
Autore | Olson Karen E. |
Pubbl/distr/stampa | Sutton, England : , : Severn House, , 2016 |
Descrizione fisica | 1 online resource (217 pages) |
Disciplina | 813.6 |
Collana | A Black Hat Thriller |
Soggetto topico |
Hackers
Secrecy |
ISBN | 1-78010-853-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intro -- Contents -- A Selection of Recent Titles by Karen E. Olson -- Title Page -- Copyright -- Prologue -- Chapter One -- Chapter Two -- Chapter Three -- Chapter Four -- Chapter Five -- Chapter Six -- Chapter Seven -- Chapter Eight -- Chapter Nine -- Chapter Ten -- Chapter Eleven -- Chapter Twelve -- Chapter Thirteen -- Chapter Fourteen -- Chapter Fifteen -- Chapter Sixteen -- Chapter Seventeen -- Chapter Eighteen -- Chapter Nineteen -- Chapter Twenty -- Chapter Twenty-One -- Chapter Twenty-Two -- Chapter Twenty-Three -- Chapter Twenty-Four -- Chapter Twenty-Five -- Chapter Twenty-Six -- Chapter Twenty-Seven -- Chapter Twenty-Eight -- Chapter Twenty-Nine -- Chapter Thirty -- Chapter Thirty-One -- Chapter Thirty-Two -- Chapter Thirty-Three -- Chapter Thirty-Four -- Chapter Thirty-Five -- Chapter Thirty-Six -- Chapter Thirty-Seven -- Chapter Thirty-Eight -- Chapter Thirty-Nine -- Chapter Forty -- Chapter Forty-One -- Chapter Forty-Two -- Chapter Forty-Three -- Chapter Forty-Four -- Chapter Forty-Five -- Chapter Forty-Six -- Chapter Forty-Seven -- Chapter Forty-Eight -- Chapter Forty-Nine -- Chapter Fifty -- Chapter Fifty-One -- Chapter Fifty-Two -- Epilogue -- Acknowledgments. |
Record Nr. | UNINA-9910162702203321 |
Olson Karen E.
![]() |
||
Sutton, England : , : Severn House, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Biohackers : the politics of open science / / Alessandro Delfanti |
Autore | Delfanti Alessandro |
Edizione | [1st ed.] |
Pubbl/distr/stampa | London, : Pluto Press, 2013 |
Descrizione fisica | 1 online resource (176 p.) |
Disciplina | 303.4834 |
Soggetto topico |
Hackers
Computer networks - Security measures Computer security |
ISBN |
1-84964-907-3
1-84964-906-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover -- Contents -- Preface -- 1. Cracking Codes, Remixing Cultures -- 2. Forbidden, Public, Enclosed, Open Science -- 3. Hackers, Rebels and Profiteers -- 4. Sailing and Sequencing the Genome Seas -- 5. Just Another Rebel Scientist -- 6. We are the Biohackers -- 7. Conclusion: How to Hack Biology -- Notes -- Bibliography -- Index. |
Record Nr. | UNINA-9910808638303321 |
Delfanti Alessandro
![]() |
||
London, : Pluto Press, 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Botnets and hackers and spam (oh, my!) [[electronic resource]] |
Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, , [2007] |
Descrizione fisica | 2 unnumbered pages : digital, PDF file |
Collana | FTC consumer alert |
Soggetto topico |
Computers - Access control
Hackers Spam (Electronic mail) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Botnets and hackers and spam |
Record Nr. | UNINA-9910697519003321 |
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, , [2007] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing / / Ahmed Sheikh |
Autore | Sheikh Ahmed |
Pubbl/distr/stampa | Berkeley, CA : , : Apress, , [2021] |
Descrizione fisica | 1 online resource (217 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Examinations
Hackers |
ISBN | 1-4842-7258-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910735396603321 |
Sheikh Ahmed
![]() |
||
Berkeley, CA : , : Apress, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Como conectarse al Internet de manera segura [[electronic resource] =] : Dialing up to the Internet : how to stay safe online |
Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002] |
Collana | Alerta para consumidores |
Soggetto topico |
Computer viruses
Hackers Microcomputers - Security measures |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | spa |
Altri titoli varianti | Dialing up to the Internet : how to stay safe online |
Record Nr. | UNINA-9910691980103321 |
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Dear hacker : letters to the editor of 2600 / / Emmanuel Goldstein |
Autore | Goldstein Emmanuel J |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, Ind., : Wiley Pub., Inc., 2010 |
Descrizione fisica | 1 online resource (579 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Hackers |
ISBN |
0-470-88978-0
1-282-68439-6 9786612684395 0-470-89020-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Dear Hacker: Letters to the Editor of 2600; About the Author; Contents; Introduction; Chapter 1: Question Upon Question; Chapter 2: Tales from the Retail Front; Chapter 3: The Challenges of Life as a Hacker; Chapter 4: Technology; Chapter 5: The Magic of the Corporate World; Chapter 6: Our Biggest Fans; Chapter 7: Behind the Walls; Chapter 8: A Culture of Rebels; Chapter 9: Strange Ramblings; Index |
Record Nr. | UNINA-9910821097903321 |
Goldstein Emmanuel J
![]() |
||
Indianapolis, Ind., : Wiley Pub., Inc., 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Defense against the black arts : how hackers do what they do and how to protect against it / / Jesse Varsalone, Matthew McFadden |
Autore | Varsalone Jesse |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Boca Raton, FL : , : Auerbach Publications, , [2017] |
Descrizione fisica | 1 online resource (408 p.) |
Disciplina | 005.8 |
Soggetto topico |
Hackers
Computer networks - Security measures Computer security |
ISBN |
0-429-10376-X
1-283-35007-6 9786613350077 1-4398-2122-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover |
Altri titoli varianti | Defense against the Black Arts |
Record Nr. | UNINA-9910410652903321 |
Varsalone Jesse
![]() |
||
Boca Raton, FL : , : Auerbach Publications, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|