THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE [Electronic resources] - نسخه متنی

Peter Szor

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Index

    [SYMBOL]
    [A]
    [B]
    [C]
    [D]
    [E]
    [F]
    [G]
    [H]
    [I]
    [J]
    [K]
    [L]
    [M]
    [N]
    [O]
    [P]
    [Q]
    [R]
    [S]
    [T]
    [U]
    [V]
    [W]
    [X]
    [Y]
    [Z]

    V.T. (virus writer)

    Darth_Vader virus

    V2Px (virus)

    self-protection technique

    Vacsina (virus)

    infection technique

    Vajda, Ference

    validation

    application rights verification

    exception-handler 2nd 3rd 4th

    input validation attacks 2nd

    MIME types 2nd 3rd 4th 5th 6th

    URL encoding 2nd

    ValleZ (virus writer)

    W32/Zelly virus

    vampire attacks

    vampire warriors (Core War game)

    van Wyk, Ken

    Varicella (virus)

    self-protection technique

    VAT (Virus Analysis Toolkit) 2nd 3rd

    VAX/VMS systems

    DCL viruses 2nd

    VBA document macros 2nd

    VBS/Bubbleboy (virus)

    safe-for-scripting ActiveX controls

    VBS/BubbleBoy (worm)

    detailed description of 2nd

    VBS/Bubbleboy (worm)

    HTML-based mail

    VBS/LoveLetter.A@mm (virus)

    infection technique

    VBS/LoveLetter.A@mm (worm)

    VBS/Loveletter.A@mm (worm)

    VBS/LoveLetter@mm (worm) 2nd

    VBS/Loveletter@mm (worm)

    script blocking

    VBS/VBSWG.J (Anna Kournikova virus)

    VBScript viruses 2nd 3rd

    VCL (Virus Creation Laboratory) 2nd 3rd

    VCL.379 (virus)

    generic disinfection methods

    VCL.428 (virus)

    VCS (Virus Construction Set) 2nd

    Vecna (virus writer)

    Coke virus

    HybrisF virus

    W32/Borm worm

    W32/HybrisF virus

    W95/Fabi virus

    W95/Regswap virus

    Veldman, Frans 2nd 3rd 4th

    Velvet (virus)

    self-protection technique

    vendors, antivirus software (contact information)

    VET (antivirus program)

    VGrep

    video memory

    checking

    Vienna (virus) 2nd 3rd

    infection technique

    VIM viruses 2nd

    Virdem (virus) 2nd

    infection technique

    VIRKILL (antivirus program)

    VIROCRK (antivirus program)

    virtual address spaces 2nd 3rd 4th 5th 6th 7th

    virtual addresses

    translation of

    virtual debuggers

    virtual machine (VM)

    virtual machine manager (VMM)

    Virtual Machine Manager (VMM) memory area

    virtual machines

    code emulation 2nd 3rd 4th

    encrypted/polymorphic virus detection 2nd 3rd 4th 5th

    Virtual Memory Manager

    virtual memory systems (Windows NT) 2nd 3rd 4th

    virtual address spaces 2nd 3rd 4th 5th 6th 7th

    VirtualAlloc() function

    VirtualProtectEx() function

    VirtualQueryEx() API

    VirtualRoot (Trojan horse)

    Virus Analysis Toolkit (VAT) 2nd

    Virus Bulletin web site

    virus construction kits 2nd

    ethics of using

    GenVir

    list of 2nd

    NGVCK 2nd 3rd

    PS-MPC 2nd

    VCL (Virus Creation Laboratory) 2nd

    VCS (Virus Construction Set) 2nd

    Virus Construction Set (VCS) 2nd

    Virus Creation Laboratory (VCL) 2nd 3rd

    virus generators

    definition of

    Virus Patrol (antivirus service)

    Virus Research Unit of the University of Tampere in Finland

    virus throttling

    viruses
    [See computer viruses]

    access control systems 2nd

    algorithmic scanning methods 2nd 3rd

    filtering 2nd 3rd

    static decryptor detection 2nd 3rd

    X-RAY method 2nd 3rd 4th 5th

    antivirus defense techniques 2nd

    behavior blocking 2nd 3rd 4th

    code emulation 2nd 3rd 4th

    dynamic decryptor detection 2nd

    encrypted/polymorphic virus detection 2nd 3rd 4th 5th

    disinfection methods 2nd 3rd 4th

    generic decryptors 2nd

    heuristics for generic repair 2nd

    standard 2nd 3rd

    first-generation antivirus scanners

    bookmarks 2nd

    entry-point scanning 2nd

    fixed-point scanning 2nd

    generic detection

    hashing 2nd

    hyperfast disk access

    mismatches

    string scanning 2nd 3rd

    top-and-tail scanning

    wildcards 2nd

    heuristic analysis

    of 32-bit Windows viruses 2nd 3rd 4th 5th 6th

    using neural networks 2nd 3rd

    inoculation 2nd

    integrity checking 2nd 3rd 4th

    metamorphic virus detection

    code emulation 2nd 3rd 4th 5th

    disassembling techniques 2nd

    geometric detection 2nd

    sand-boxing 2nd

    second-generation antivirus scanners

    exact identification 2nd 3rd

    nearly-exact identification 2nd

    skeleton detection

    smart scanning 2nd

    Visual .NET 2003 (Microsoft) 2nd 3rd 4th

    VLAD (virus writer)

    W95/Boza virus

    VM (virtual machine)

    VMM (virtual machine manager)

    VMM (Virtual Machine Manager) memory area

    VMWARE 2nd 3rd 4th

    von Neumann, John

    self-reproducing automata theory 2nd 3rd

    von Neumann, Nicholas

    VOOGLE

    VPN (virtual private network) [See also network-level defense strategies]

    VTC (University of Hamburg's Virus Test Center)

    vulnerabilities

    blended attacks
    [See blended attacks]

    vulnerability dependency

    VxD viruses

    VxD-based viruses (infection technique) 2nd 3rd 4th

    VxDs

    LE (linear executable) file format

    Vyssotsky, Victor

    Core War


  • / 191