THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [X]
    [Y]
    [Z]

    UDP-based attacks

    versus TCP-based attacks

    Ulam, Stanislaw

    UMB (upper memory block)

    undocumented CPU instructions

    undocumented functions

    virus self-protection techniques 2nd

    Unicode strings [See also strings]

    University of Hamburg's Virus Test Center (VTC)

    University of Magdeburg

    UNIX

    ELF viruses 2nd

    shell scripts 2nd

    shellcode blocking 2nd 3rd 4th 5th 6th 7th 8th

    unknown entry points (infection technique) 2nd 3rd 4th

    unknown virus removal

    unpacking

    malicious code analysis techniques 2nd

    up-conversion

    of macro viruses 2nd

    update interface

    of worms 2nd 3rd 4th 5th

    authenticated updates 2nd 3rd 4th 5th 6th 7th

    backdoor-based updates 2nd

    updates

    security

    buffer overflow attacks (worms) 2nd 3rd

    upper 2G of address space (memory scanning)

    upper memory block (UMB)

    UPX (run-time packer)

    URL encoding 2nd

    user address space of processes, scanning the

    user macros

    infecting

    user mode

    memory scanning in 2nd 3rd

    executed images (Win32 viruses 2nd 3rd

    hidden window procedure (Win32 viruses

    native Windows NT service viruses

    NtQuerySystemInformation() (NtQSI) 2nd 3rd

    processes/rights 2nd

    Win32 viruses 2nd 3rd 4th

    viruses in processes 2nd

    user mode rootkits

    definition of

    user-mode

    debuggers

    user-mode rootkits

    definition of

    UTF-8 encoding 2nd


  • / 191