The art of computer virus research and defense
Saved in:
Main Authors: | |
---|---|
Published: |
Addison-Wesley,
|
Publisher Address: | Upper Saddle River, NJ |
Publication Dates: | 2005. |
Literature type: | Book |
Language: | English |
Subjects: | |
Carrier Form: | xxvii, 713 p.: ill. ; 24 cm. |
ISBN: | 0321304543 (pbk.) |
Index Number: | TP309 |
CLC: | TP309.5 |
Call Number: | TP309.5/S998 |
Contents: |
Includes bibliographical references and index. Strategies of the attacker -- The fascination of malicious code analysis -- Malicious code environments -- Classification of infection strategies -- Classification of in-memory strategies -- Basic self-protection strategies -- Advanced code evolution techniques and computer virus generator kits -- Classification according to payload -- Strategies of computer worms -- Exploits, vulnerabilities, and buffer overflow attacks -- Strategies of the defender -- Antivirus defense techniques -- Memory scanning and disinfection -- Worm-blocking techniques and host-based intrusion prevention -- Network-level defense strategies -- Malicious code analysis techniques. |