在好例子网,分享、交流、成长!
您当前所在位置:首页Others 开发实例一般编程问题 → 黑客攻防技术宝典-反病毒篇 The Antivirus Hackers Handbook [1ed. en]

黑客攻防技术宝典-反病毒篇 The Antivirus Hackers Handbook [1ed. en]

一般编程问题

下载此实例
  • 开发语言:Others
  • 实例大小:4.95M
  • 下载次数:15
  • 浏览次数:124
  • 发布时间:2020-10-06
  • 实例类别:一般编程问题
  • 发 布 人:robot666
  • 文件格式:.zip
  • 所需积分:2
 

实例介绍

【实例简介】
黑客攻防技术宝典-反病毒篇 The Antivirus Hackers Handbook [1ed. en]
The Antivirus hacker s Handbook www.it-ebooksinfo ffirs indd 08: 14: 22: AM 08/13/2015 Page i www.it-ebooksinfo The Antivirus hackers Handbook Joxean Koret Elias Bachaalany WILEY www.it-ebooksinfo ffirs indd 08: 14: 22: AM 08/13/2015 Page iii The Antivirus hacker's handbook Published by John Wiley Sons, Inc 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright o 2015 by John Wiley Sons, Inc, Indianapolis, Indiana Published simultaneously in Canada ISBN:978-1-119-02875-8 ISBN:978-1-119-02876-5(ebk) ISBN:978-1-119-02878-9(ebk) Manufactured in the united states of america 10987654321 No part of this publication may be reproduced stored in a retrieval system or transmitted in any form or y any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis- sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA O1923,(978)750-8400, fax(978)646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley Sons, Inc 1llRiverStreetHoboken,Nj07030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley com/go/permissions Limit of Liability/ Disclaimer of Warranty: The publisher and the author make no representations or war- ranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties,including withoul limitation warranties of fitness for a parlicular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation d/or a potential t mean that the author or the publisher end the information the organization or website may provide or recommendations it may make. Further, readers should be aware that Internel websiles listed in this work may have changed or disappeared belween when this work was written and when it is read For general information on our other products and services please contact our Customer Care Department within the United States at (877)762-2974, outside the United States at(317)572-3993 or fax(317)572-4002 Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or dVd that is not included in the version you purchased, you may download thismaterialathttp://booksupport.wileycomfOrmoreinformationaboutWileyproductsvisit www.wiley.com Library of Congress Control Number: 2015945503 Trademarks: Wiley and the wiley logo are trademarks or registered trademarks of john wiley sons Inc and/orits affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley Sons, Inc is not associated with any product or vendor mentioned in this book www.it-ebooksinfo ffirs indd 08: 14: 22: AM 08/13/2015 Page iv About the authors Joxean Koret has been working for the past +15 years in many different com puting areas. He started as a database software developer and DBA, working with a number of different RDBMSs. Afterward he got interested in reverse engineering and applied this knowledge to the DBs he was working with. He has discovered dozens of vulnerabilities in products from the major database vendors, especially in Oracle software. He also worked in other security areas such as developing IDA Pro at Hex-Rays or doing malware analysis and anti- malware software development for an antivirus company knowledge that was applied afterward to reverse-engineer and break over 14 AV products in roughly one year. He is currently a security researcher in Coseinc Elias Bachaalany has been a computer programmer, a reverse-engineer, an occa sional reverse-engineering trainer, and a technical writer for the past 14 vears Elias has also co-authored the book Practical Reverse Engineering, published by Wiley(ISBN: 978-111-8-78731-1. He has worked with various technologies and programming languages including writing scripts, doing web development, working with database design and programming, writing Windows device drivers and low-level code such as boot loaders or minimal operating systems writing managed code, assessing software protections, and writing reverse engineering and desktop security tools. Elias has also presented twice at recon Montreal (2012 and 2013) While working for Hex-Rays SA in Belgium, Elias helped improve and add new features to IDA Pro. During that period, he authored various technical blog posts, provided IDA Pro training, developed various debugger plug-ins, amped up IDA Pro's scripting facilities, and contributed to the IDAPython project Elias currently works at microsoft www.it-ebooksinfo ffirs indd 08: 14: 22: AM 08/13/2015 Page v www.it-ebooksinfo Credits Project Editor Professional Technology Sydney argenta Strategy Director Barry pruett Technical editor Daniel pistelli Business manager Production editor Amy knies Saleem hameed Sulthan Associate Publisher Copy Editor Jim mintel Marylouise wick Project Coordinator, Cover Brent Savage Manager of content development &e assembly Proofreader Mary beth Wakefield Nicole hirschman Production Manager Indexer Kathleen wisor Nancy guenther Marketing Director Cover designer David mayhew Marketing manager Cover Image Carrie sherrill Wiley: Shield C iStock. com/DSGpro www.it-ebooksinfo ffirs indd 08: 14: 22: AM 08/13/2015 Page vii www.it-ebooksinfo 【实例截图】
【核心代码】

标签:

实例下载地址

黑客攻防技术宝典-反病毒篇 The Antivirus Hackers Handbook [1ed. en]

不能下载?内容有错? 点击这里报错 + 投诉 + 提问

好例子网口号:伸出你的我的手 — 分享

网友评论

发表评论

(您的评论需要经过审核才能显示)

查看所有0条评论>>

小贴士

感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。

  • 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  • 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
  • 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  • 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。

关于好例子网

本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明

;
报警