Peter Szor systematically covers everything you need to know, The Art of Computer Virus Research and Defense: ART COMP VIRUS RES. Unlike most books on computer viruses, “The Art of Computer Virus Research and Defense” is a reference written strictly for white hats: IT and security. Unlike most books on computer viruses, The Art of Computer Virus Research and Peter Szor systematically covers everything you need to know, including.

Author: Milkree Gardagor
Country: Monaco
Language: English (Spanish)
Genre: Relationship
Published (Last): 26 March 2008
Pages: 380
PDF File Size: 14.65 Mb
ePub File Size: 8.37 Mb
ISBN: 654-3-17474-707-6
Downloads: 99477
Price: Free* [*Free Regsitration Required]
Uploader: Faushakar

IT and security professionals responsible for protecting their organizations against malware.

Table of contents About the Author. IT and security professionals responsible for protecting their organizations against malware. Theory of Self-Reproducing Automata Fredkin: Account Options Sign in.

The Art of Computer Virus Research and Defense : Peter Szor :

IT and security professionals The Ultimate Virus Generator? Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. Szor presents the state-of-the-art in both malware and protection, providing the rssearch technical detail that professionals need to handle increasingly complex attacks.

Memory Scanning and Disinfection. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book. Introduction to the Games of Nature. Peter Szor is security architect for Symantec Security Response, where he has been designing and building antivirus technologies for the Norton AntiVirus product line since Additional terms Terms of transaction.

This book’s coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: Chain Letters Other Pests: Symantec’s chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools.

  INFOCUS IN24 MANUAL PDF

Additional information Publisher Pearson Education. Dispatched from the UK in 2 business days When will my order arrive? To rate and review, sign in. Your review will post soon.

DLL loaded machine macro viruses malicious code malware memory metamorphic method Microsoft module Morris worm operating system overwrite password platforms pointer polymorphic polymorphic engine port problem processor reloc replicate return address routine scanner scanning script server shellcode shown in Figure simple SMTP stack StackGuard string target thread tion typically variants virtual virus body Virus Bulletin virus code virus writers vulnerable Welchia Windows 95 Windows NT.

Book ratings by Goodreads. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks.

The Art of Computer Virus Research and Defense

Byshowing how eesearch really work, this book will help security professionals andstudents protect against them, recognize them, and analyze and limit thedamage they can do. Szor also offers the most thorough and practical primer on virus analysis ever published–addressing everything from creating your own personal laboratory to automating the analysis process. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more.

Exploits Vulnerabilities and Buffer Overflow Attacks. Introduction to the Games of Nature.

The Art of Computer Virus Research and Defense – Peter Szor – Google Books

The Art of Computer VirusResearch and Defense entertains readers with its look at vomputer research, butmore importantly it truly arms them in the fight against computer viruses. IT and security professionals responsible for protecting their organizations against malware. IT and security professionals responsible for protecting their organizations against malware.

  LIBER PYRAMIDOS PDF

By using our website you agree to our use of cookies. From inside the book. Peter Szor systematically covers everything you need to know, including virus petfr and classification, protection strategies, antivirus and worm-blocking techniques, and much more.

Account Options Sign in. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. The Fascination of Malicious Code Analysis. Pearson EducationFeb 3, – Computers – pages. There is very little trustworthy information about computer viruses.

Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book. Common terms and phrases address space algorithm antivirus software application attack binary block boot sector buffer overflow bytes checksum CodeRed command computer viruses computer worms copy create debugger decryption decryptor detection disinfection disk diskette driver e-mail emulation encrypted entry point Eugene Kaspersky example executed exploit file format function handler header heuristic hook host program implement infect files computet techniques infector instruction Internet IP address kernel kernel-mode KERNEL From toSzor wrote and maintained his own antivirus program, Pasteur.

Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: Please try again later.