My Library

University LibraryCatalogue

     
Limit search to items available for borrowing or consultation
Result Page: Previous Next
Can't find that book? Try BONUS+
 

Search Discovery

Search CARM Centre Catalogue

Search Trove

Add record to RefWorks

E-RESOURCE
Author Szor, Peter, author.

Title Art of Computer Virus Research and Defense, The [electronic resource] / Szor, Peter.

Published Addison-Wesley Professional, 2005.

Copies

Location Call No. Status
 UniM INTERNET resource    AVAILABLE
Edition 1st edition
Physical description 744 p.
Series Safari Books Online
Summary "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." —Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code—and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
Reproduction Electronic reproduction. Boston, MA : Safari, Available via World Wide Web. 2005.
System notes Mode of access: World Wide Web.
NOTES Copyright © 2005 Symantec Corporation 2005
Issuing body notes Made available through: Safari, an O’Reilly Media Company.
Other author Safari, an O’Reilly Media Company.
Subject Electronic books.
ISBN 0321304543
0321304543
9780321304544
Standard Number 9780321304544
0321304543