Author: Peter Szor
Edition: 1
Binding: Kindle Edition
ISBN: B003DQ4WLQ
Edition: 1
Binding: Kindle Edition
ISBN: B003DQ4WLQ
The Art of Computer Virus Research and Defense
Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Download The Art of Computer Virus Research and Defense from rapidshare, mediafire, 4shared. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, Search and find a lot of computer books in many category availabe for free download.
The Art of Computer Virus Research and Defense Free
The Art of Computer Virus Research and Defense computer books for free. Along the way,
Related education books
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.
For those who want to stay ahead of the late
Malware Analyst's Cookbook: Tools and Techniques for Fighting Malicious Code
A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the p
Reversing: Secrets of Reverse Engineering
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth
No comments:
Post a Comment