THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [X]
    [Y]
    [Z]

    hackers

    half-cooked repairs

    definition of

    Hamming code

    error detection and correction 2nd

    Hamming, Richard

    Happy99 (worm) 2nd

    e-mail address harvesting 2nd 3rd 4th

    NNTP attacks

    Happy99 worm 2nd 3rd

    nondestructrive payload viruses

    hard-coded API addresses 2nd

    hardware destroying viruses 2nd

    hardware-level stealth viruses 2nd 3rd

    Hare (virus)

    infection technique

    self-protection technique

    harvesting e-mail addresses (worms) 2nd 3rd 4th 5th 6th 7th

    hashing

    first-generation antivirus scanners 2nd

    header

    PE files 2nd 3rd 4th 5th

    header infection viruses (infection technique) 2nd

    heap management 2nd

    heap overflows 2nd 3rd 4th

    exploiting 2nd 3rd 4th

    Linux/Slapper worm 2nd 3rd 4th 5th 6th 7th 8th

    heap-based overflow attacks, compiler-level solutions

    heaps

    definition of 2nd

    exception-handler validation

    Helenius, Marko

    Helenius, marko

    Help file viruses 2nd

    heuristic analysis

    antiheuristics techniques (armored viruses) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    of 32-bit Windows viruses 2nd 3rd 4th 5th 6th

    using neural networks 2nd 3rd

    heuristic behavior-blocking systems

    heuristics

    code emulation 2nd

    for generic repair 2nd

    Heyne, Frank

    hidden window procedure (Win32 viruses)

    HIEW tool 2nd

    goat files (cleaning)

    High Memory Area (HMA)

    high-interaction honeypot systems

    highly destructive payload viruses 2nd 3rd 4th 5th 6th 7th

    history of antivirus programs 2nd

    history of blended attacks 2nd

    history of computer viruses 2nd 3rd

    history of self-replicating systems

    Core War 2nd 3rd 4th

    Edward Fredkin structures 2nd 3rd

    game of Life (Conway) 2nd 3rd 4th 5th 6th

    John von Neumann theory 2nd 3rd

    history of Win32 viruses 2nd

    hit list method
    [See IP addresses, scanning]

    hive

    definition of

    HLP/Demo (virus)

    HMA (High Memory Area)

    hoaxes

    definition of 2nd

    holes in memory

    Honeyd

    honeypot systems 2nd 3rd

    hook table for Frodo virus 2nd

    hooking

    API hooking (infection technique) 2nd 3rd

    function call-hooking (infection technique) 2nd 3rd

    IAT (import address table) 2nd

    interrupts 2nd 3rd 4th 5th

    INT 1 and INT 3

    on INT 13h (boot viruses) 2nd 3rd

    on INT 21h (file viruses) 2nd 3rd 4th

    host application mutation (metamorphic viruses) 2nd

    host file headers

    encryption 2nd

    host files

    detection of end

    host size dependency 2nd

    host-based intrusion prevention techniques 2nd 3rd 4th

    buffer overflow attcks

    blocking 2nd

    code reviews

    compiler-level solutions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

    kernel-mode extensions 2nd

    opreating system-level solutions 2nd 3rd

    program shepherding 2nd

    subsystem extensions 2nd

    script/SMTP blocking 2nd 3rd WebTV worms 2nd

    HTML viruses 2nd

    HTML-based mail

    HybrisF (virus)

    self-protection technique

    HyperCard

    HyperTalk viruses 2nd

    hyperfast disk access

    first-generation antivirus scanners

    HyperTalk viruses 2nd

    Hypervisor (virus)

    Hypponen, Mikko 2nd 3rd


  • / 191