top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
Autore Koret Joxean
Edizione [First edition.]
Pubbl/distr/stampa Indianapolis, IN : , : John Wiley and Sons, , [2015]
Descrizione fisica 1 online resource (384 p.)
Disciplina 005.84
Soggetto topico Hackers
Computer viruses
ISBN 1-119-18352-9
1-119-02878-7
1-119-02876-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux
Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams
ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer
Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses
Using Anti-emulation Techniques
Record Nr. UNINA-9910131650203321
Koret Joxean  
Indianapolis, IN : , : John Wiley and Sons, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
The Antivirus hacker's handbook / / Joxean Koret, Elias Bachaalany
Autore Koret Joxean
Edizione [First edition.]
Pubbl/distr/stampa Indianapolis, IN : , : John Wiley and Sons, , [2015]
Descrizione fisica 1 online resource (384 p.)
Disciplina 005.84
Soggetto topico Hackers
Computer viruses
ISBN 1-119-18352-9
1-119-02878-7
1-119-02876-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Introduction; Part I Antivirus Basics; Chapter 1 Introduction to Antivirus Software; What Is Antivirus Software?; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core
Reverse-Engineering ToolsCommand-Line Tools versus GUI Tools; Debugging Symbols; Tricks for Retrieving Debugging Symbols; Debugging Tricks; Backdoors and Configuration Settings; Kernel Debugging; Debugging User-Mode Processes with a Kernel-Mode Debugger; Analyzing AV Software with Command-Line Tools; Porting the Core; A Practical Example: Writing Basic Python Bindings for Avast for Linux; A Brief Look at Avast for Linux; Writing Simple Python Bindings for Avast for Linux; The Final Version of the Python Bindings; A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux
Other Components Loaded by the KernelSummary; Chapter 3 The Plug-ins System; Understanding How Plug-ins Are Loaded; A Full-Featured Linker in Antivirus Software; Understanding Dynamic Loading; Advantages and Disadvantages of the Approaches for Packaging Plug-ins; Types of Plug-ins; Scanners and Generic Routines; File Format and Protocol Support; Heuristics; Bayesian Networks; Bloom Filters; Weights-Based Heuristics; Some Advanced Plug-ins; Memory Scanners; Non-native Code; Scripting Languages; Emulators; Summary; Chapter 4 Understanding Antivirus Signatures; Typical Signatures; Byte-Streams
ChecksumsCustom Checksums; Cryptographic Hashes; Advanced Signatures; Fuzzy Hashing; Graph-Based Hashes for Executable Files; Summary; Chapter 5 The Update System; Understanding the Update Protocols; Support for SSL/TLS; Verifying the Update Files; Dissecting an Update Protocol; When Protection Is Done Wrong; Summary; Part II Antivirus Software Evasion; Chapter 6 Antivirus Software Evasion; Who Uses Antivirus Evasion Techniques?; Discovering Where and How Malware Is Detected; Old Tricks for Determining Where Malware Is Detected: Divide and Conquer
Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses
Using Anti-emulation Techniques
Record Nr. UNINA-9910824210803321
Koret Joxean  
Indianapolis, IN : , : John Wiley and Sons, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bens Fukushima : Roman / / Thomas Rüst
Bens Fukushima : Roman / / Thomas Rüst
Autore Rust Thomas
Pubbl/distr/stampa Zürich, [Switzerland] : , : edition 8, , 2014
Descrizione fisica 1 online resource (441 pages)
Disciplina 813.54
Soggetto topico Whistle blowing
Fukushima Nuclear Disaster, Japan, 2011
Leaks (Disclosure of information)
Hackers
ISBN 3-85990-225-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Record Nr. UNINA-9910153459603321
Rust Thomas  
Zürich, [Switzerland] : , : edition 8, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Betrayed : the Nicole Jones series / / Karen E. Olson
Betrayed : the Nicole Jones series / / Karen E. Olson
Autore Olson Karen E.
Pubbl/distr/stampa Sutton, England : , : Severn House, , 2016
Descrizione fisica 1 online resource (217 pages)
Disciplina 813.6
Collana A Black Hat Thriller
Soggetto topico Hackers
Secrecy
ISBN 1-78010-853-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- A Selection of Recent Titles by Karen E. Olson -- Title Page -- Copyright -- Prologue -- Chapter One -- Chapter Two -- Chapter Three -- Chapter Four -- Chapter Five -- Chapter Six -- Chapter Seven -- Chapter Eight -- Chapter Nine -- Chapter Ten -- Chapter Eleven -- Chapter Twelve -- Chapter Thirteen -- Chapter Fourteen -- Chapter Fifteen -- Chapter Sixteen -- Chapter Seventeen -- Chapter Eighteen -- Chapter Nineteen -- Chapter Twenty -- Chapter Twenty-One -- Chapter Twenty-Two -- Chapter Twenty-Three -- Chapter Twenty-Four -- Chapter Twenty-Five -- Chapter Twenty-Six -- Chapter Twenty-Seven -- Chapter Twenty-Eight -- Chapter Twenty-Nine -- Chapter Thirty -- Chapter Thirty-One -- Chapter Thirty-Two -- Chapter Thirty-Three -- Chapter Thirty-Four -- Chapter Thirty-Five -- Chapter Thirty-Six -- Chapter Thirty-Seven -- Chapter Thirty-Eight -- Chapter Thirty-Nine -- Chapter Forty -- Chapter Forty-One -- Chapter Forty-Two -- Chapter Forty-Three -- Chapter Forty-Four -- Chapter Forty-Five -- Chapter Forty-Six -- Chapter Forty-Seven -- Chapter Forty-Eight -- Chapter Forty-Nine -- Chapter Fifty -- Chapter Fifty-One -- Chapter Fifty-Two -- Epilogue -- Acknowledgments.
Record Nr. UNINA-9910162702203321
Olson Karen E.  
Sutton, England : , : Severn House, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Botnets and hackers and spam (oh, my!) [[electronic resource]]
Botnets and hackers and spam (oh, my!) [[electronic resource]]
Pubbl/distr/stampa [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, , [2007]
Descrizione fisica 2 unnumbered pages : digital, PDF file
Collana FTC consumer alert
Soggetto topico Computers - Access control
Hackers
Spam (Electronic mail)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Botnets and hackers and spam
Record Nr. UNINA-9910697519003321
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing / / Ahmed Sheikh
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing / / Ahmed Sheikh
Autore Sheikh Ahmed
Pubbl/distr/stampa Berkeley, CA : , : Apress, , [2021]
Descrizione fisica 1 online resource (217 pages)
Disciplina 005.8
Soggetto topico Computer security - Examinations
Hackers
ISBN 1-4842-7258-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910735396603321
Sheikh Ahmed  
Berkeley, CA : , : Apress, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Como conectarse al Internet de manera segura [[electronic resource] =] : Dialing up to the Internet : how to stay safe online
Como conectarse al Internet de manera segura [[electronic resource] =] : Dialing up to the Internet : how to stay safe online
Pubbl/distr/stampa [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002]
Collana Alerta para consumidores
Soggetto topico Computer viruses
Hackers
Microcomputers - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione spa
Altri titoli varianti Dialing up to the Internet : how to stay safe online
Record Nr. UNINA-9910691980103321
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Defense against the black arts : how hackers do what they do and how to protect against it / / Jesse Varsalone, Matthew McFadden
Defense against the black arts : how hackers do what they do and how to protect against it / / Jesse Varsalone, Matthew McFadden
Autore Varsalone Jesse
Edizione [1st ed.]
Pubbl/distr/stampa Boca Raton, FL : , : Auerbach Publications, , [2017]
Descrizione fisica 1 online resource (408 p.)
Disciplina 005.8
Soggetto topico Hackers
Computer networks - Security measures
Computer security
ISBN 9786613350077
9780429103766
042910376X
9781283350075
1283350076
9781439821220
1439821224
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover
Altri titoli varianti Defense against the Black Arts
Record Nr. UNINA-9910410652903321
Varsalone Jesse  
Boca Raton, FL : , : Auerbach Publications, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Dialing up to the Internet [[electronic resource] ] : how to stay safe online
Dialing up to the Internet [[electronic resource] ] : how to stay safe online
Pubbl/distr/stampa [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002]
Collana FTC consumer alert
Soggetto topico Computer viruses
Hackers
Microcomputers - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Dialing up to the Internet
Record Nr. UNINA-9910695516703321
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2002]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Dissecting the hack : the V3rb0ten network / / Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin ; contributors, Brittney Jordan [and five others]
Dissecting the hack : the V3rb0ten network / / Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin ; contributors, Brittney Jordan [and five others]
Autore Street Jayson E.
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam, Netherlands : , : Syngress, , 2015
Descrizione fisica 1 online resource (306 p.)
Disciplina 364.168
Soggetto topico Computer crimes
Computer crimes - Investigation
Computer networks - Security measures
Computer security
Hackers
ISBN 0-12-804282-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Dissecting the Hack; Copyright Page; Dedication; Contents; List of Contributors; About the Authors; Foreword; Acknowledgments; About the Book; 1 The V3rb0t3n Network; Prologue; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Chapter 11; Epilogue; 2 Interview Interlude; Adam Laurie Co-Founder and Director of Aperture Labs Ltd.; Thomas Lim Founder and CEO of COSEINC; Josh Thomas Chief Breaker & Partner at Atredis Partners; 3 Star; Radio Frequency Identification (RFID); BitCoin and Digital Currency; Steganography
SSL EncryptionAdvanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Malware Communications; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance; 3D Printers; Maltego; ROT13; Wickr; Pastebin; Women in Technology; Pirate Party; magicJack; Firewalls; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Spaces; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; BruCON; 44Con; OPSEC
Pentesting HardwareAnonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings; Hackers for Charity; Endnotes; Radio Frequency Identification (RFID); BitCoin and Digital Currency; Steganography; SSL Encryption; Advanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance
3D Printer AttacksROT13; Wickr; Pastebin; Women in Technology; Pirate Party; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; OPSEC; Pentesting Hardware; Anonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings
Record Nr. UNINA-9910797485803321
Street Jayson E.  
Amsterdam, Netherlands : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui