Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
The Art of Computer Virus Research and Defense
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

The Art of Computer Virus Research and Defense

The Art of Computer Virus Research and Defense

Peter Szor

714 pages, parution le 11/03/2005

Résumé

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more.

Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats.

Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes

  • Discovering how malicious code attacks on a variety of platforms
  • Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more
  • Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic
  • Mastering empirical methods for analyzing malicious code-and what to do with what you learn
  • Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines
  • Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more
  • Using worm blocking, host-based intrusion prevention, and network-level defense strategies

Sommaire

  • Strategies of the Attacker
    • Introduction to the Games of Nature
    • The Fascination of Malicious Code Analysis
    • Malicious Code Environments
    • Classification of Infection Strategies
    • Classification of In-Memory Strategies
    • Basic Self-Protection Strategies
    • Advanced Code Evolution Techniques and Computer Virus Generator Kits
    • Classification According to Payload
    • Strategies of Computer Worms
    • Exploits, Vulnerabilities, and Buffer Overflow Attacks
  • Strategies of the Defender
    • Antivirus Defense Techniques
    • Memory Scanning and Disinfection
    • Worm-Blocking Techniques and Host-Based Intrusion Prevention
    • Network-Level Defense Strategies
    • Malicious Code Analysis Techniques
    • Conclusion
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Addison Wesley
Auteur(s) Peter Szor
Parution 11/03/2005
Nb. de pages 714
Format 17,5 x 23,5
Couverture Broché
Poids 1055g
Intérieur Noir et Blanc
EAN13 9780321304544

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription