Antivirus Engines: From Methods to Innovations, Design, and Applications
Autor Paul A. Gagniucen Limba Engleză Paperback – 24 oct 2024
- Offers a thorough exploration of the mechanics behind antivirus detection methods, including signature-based detection, heuristic algorithms, and modern smart scanning techniques, with native source code examples to illustrate these core concepts
- Provides fundamental native implementations of various antivirus engines, allowing readers to directly experiment with MD5, SHA, hexadecimal scanners, and heuristic models to expand their technical skills
- Highlights practical case studies and examples of integrating antivirus software into real-world systems, helping cybersecurity professionals and developers design and implement robust protective measures adapted to evolving threats
- Delivers actionable insights for business leaders, policymakers, and IT decision-makers, emphasizing the critical role antivirus software plays in safeguarding digital infrastructure, facilitating informed cybersecurity investments
Preț: 534.78 lei
Preț vechi: 795.65 lei
-33% Nou
Puncte Express: 802
Preț estimativ în valută:
102.42€ • 105.52$ • 85.80£
102.42€ • 105.52$ • 85.80£
Carte tipărită la comandă
Livrare economică 17 februarie-03 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780443329524
ISBN-10: 0443329524
Pagini: 656
Dimensiuni: 216 x 276 mm
Greutate: 0.45 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0443329524
Pagini: 656
Dimensiuni: 216 x 276 mm
Greutate: 0.45 kg
Editura: ELSEVIER SCIENCE
Cuprins
1. History
2. The Internet
3. Operating systems
4. Operating system APIs
5. Cryptography
6. Exploits
7. Malware types and classification
8. Antivirus engines
9. Algorithms
10. MD5/SHA signatures and scanners
11. Disinfections, banks and vaults
12. Hexadecimal signatures and scanners
13. Heuristic signatures and scanners
14. Smart scanners and rabbit holes
15. Process and user behavior
16. The network
17. Appendices
18. References
2. The Internet
3. Operating systems
4. Operating system APIs
5. Cryptography
6. Exploits
7. Malware types and classification
8. Antivirus engines
9. Algorithms
10. MD5/SHA signatures and scanners
11. Disinfections, banks and vaults
12. Hexadecimal signatures and scanners
13. Heuristic signatures and scanners
14. Smart scanners and rabbit holes
15. Process and user behavior
16. The network
17. Appendices
18. References