[PDF] The Art of Computer Virus Research and Defense

ISBN: 0321304543

Category: Tutorial

Posted on 2018-01-30, by luongquocchinh.


Author: Peter Szor | Category: Security | Language: English | Page: 744 | ISBN: 0321304543 |

Description: Peter Szor takes you behind the scenes of anti-virus research, showing howthey are analyzed, how they spread, and--most importantly--how to effectivelydefend against them. This book offers an encyclopedic treatment of thecomputer virus, including: a history of computer viruses, virus behavior,classification, protection strategies, anti-virus and worm-blocking techniques,and how to conduct an accurate threat analysis. The Art of Computer VirusResearch and Defense entertains readers with its look at anti-virus research, butmore importantly it truly arms them in the fight against computer viruses.As one of the lead researchers behind Norton AntiVirus, the most popularantivirus program in the industry, Peter Szor studies viruses every day. Byshowing how viruses really work, this book will help security professionals andstudents protect against them, recognize them, and analyze and limit thedamage they can do. From the Back Cover "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes * Discovering how malicious code attacks on a variety of platforms * Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more * Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic * Mastering empirical methods for analyzing malicious code-and what to do with what you learn * Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines * Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more * Using worm blocking, host-based intrusion prevention, and network-level defense strategies

DOWNLOADDownload this book
The Art of Computer Virus Research and Defense.pdf

Sponsored High Speed Downloads
9004 dl's @ 2311 KB/s
Download Now [Full Version]
9590 dl's @ 3802 KB/s
Download Link 1 - Fast Download
8059 dl's @ 3241 KB/s
Download Mirror - Direct Download

Search More...
[PDF] The Art of Computer Virus Research and Defense

Search free ebooks in ebookee.com!

Download this book

No active download links here?
Please check the description for download links if any or do a search to find alternative books.

Related Books


No comments for "[PDF] The Art of Computer Virus Research and Defense".

    Add Your Comments
    1. Download links and password may be in the description section, read description carefully!
    2. Do a search to find mirrors if no download links or dead links.
    Back to Top