The Art of Computer Virus Research and Defense

The Art of Computer Virus Research and Defense

Paperback - 2005
Rate this:
Of all the computer-related books I ve read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book.--Halvar Flake, Reverse Engineer, SABRE Security GmbHSymantec s chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. other emerging techniques, so you can anticipate and prepare for future threats.Szor also offers the most thorough and practical primer on virus analysis ever published--addressing everything from creating your own personal laboratory to automating the analysis process. This book s coverage includesDiscovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and moreIdentifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphicMastering empirical methods for analyzing malicious code--and what to do with what you learnReverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machinesImplementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much moreUsing worm blocking, host-based intrusion prevention, and network-level defense strategies(c) Copyright Pearson Education. All rights reserved.
Publisher: Upper Saddle River, NJ : Addison-Wesley, c2005.
ISBN: 9780321304544
0321304543
Branch Call Number: 005.84
Characteristics: xxvii, 713 p. : ill. ; 24 cm.

Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age

Add Age Suitability

There are no ages for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number

Recommendations

Subject Headings

  Loading...

Find it at SLPL

  Loading...
[]
[]
To Top