We love eBooks
    Download The Art of Computer Virus Research and Defense pdf, epub, ebook

    This site is safe

    You are at a security, SSL-enabled, site. All our eBooks sources are constantly verified.

    The Art of Computer Virus Research and Defense

    By Peter Szor

    What do you think about this eBook?

    About

    Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more.

    Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats.

    Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes

    • Discovering how malicious code attacks on a variety of platforms
    • Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more
    • Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic
    • Mastering empirical methods for analyzing malicious code—and what to do with what you learn
    • Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines
    • Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more
    • Using worm blocking, host-based intrusion prevention, and network-level defense strategies
    Download eBook Link updated in 2017
    Maybe you will be redirected to source's website
    Thank you and welcome to our newsletter list! Ops, you're already in our list.

    Related to this eBook

    Browse collections Find similar eBooks

    Keep connected to us

    Follow us on Social Media or subscribe to our newsletter to keep updated about eBooks world.

    Explore eBooks

    Browse all eBook collections

    Collections is the easy way to explore our eBook directory.