Text
The art of computer virus research and defense
Table of contents:
1. Introduction to the game of nature
2. The fascination of malicious code analysis
3. Malicious code environments
4. Classification of infection strategies
5. Classification of in-memory strategies
6. Basic self-protection strategies
7. Advanced code evolution techniques and computer virus generator kits
8. Classification according to payload
9. Strategies of computer worms
10. Exploits, vulnerabilities, and buffer overflow attacks
11. Antivirus defense techniques
12. Memory scanning and disinfection
13. Worm-blocking techniques and host-based intrusion prevention
14. Network-level defense strategies
15. Malicious code analysis techniques.
No other version available