Criar um Site Grátis Fantástico


Total de visitas: 14880

The Art of Computer Virus Research and Defense

The Art of Computer Virus Research and Defense

The Art of Computer Virus Research and Defense. Peter Szor

The Art of Computer Virus Research and Defense


The.Art.of.Computer.Virus.Research.and.Defense.pdf
ISBN: 0321304543,9780321304544 | 744 pages | 19 Mb


Download The Art of Computer Virus Research and Defense



The Art of Computer Virus Research and Defense Peter Szor
Publisher: Addison-Wesley Professional




The author also advises the reader to review the Win32.CTX.Phage description written by Peter Szor and Wason Han , since this article does not .. This article will examine the evolution of virus code as documented by Peter Szor in his book The Art Of Computer Virus Research And Defense [3], and apply what is learned in the context of Protection Schemes. A könyv eredetileg az Addison Wesley kiadónál jelent meg 2005-ben, The Art of Computer Virus Research and Defense címen. Addison Wesley Professional, 1 edition, February 2005. Peter Szor, The Art of Computer Virus Research and Defense ISBN: 0321304543 | edition 2005 | CHM | 744 pages | 13,4 mbThis book offers an encyclopedic treatment of thecomputer virus, incl. T-110.6220 Malware Analysis and Antivirus Technologies For course reading material, we're using Peter Szor's book "The Art of Computer Virus Research and Defense". The only books I can cite are Reversing: Secret of Reverse Engineering (Chapter 7 for finding vulnerabilities in binaries), and The Art of Computer Virus Research and Defense, section 15.4.3. PhD thesis, University of Southern California, 1986. For more information, please see the course pages. The Art of Computer Virus Research and Defense. Http://vx.netlux.org/29a/29a-4/29a-4.223 EPO by GriYo / 29a. Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. The reader should know the basics of IA-32 assembly and the main elements of the Portable Executable (PE) file structure to fully understand this article.

Other ebooks:
And Suddenly the Inventor Appeared: TRIZ, the Theory of Inventive Problem Solving pdf
Applied Cryptanalysis: Breaking Ciphers in the Real World pdf
Fundamentals of Strategy epub