The Antivirus Hacker's Handbook

The Antivirus Hacker's Handbook

English | PDF | 2015 | 363 Pages | ISBN : 1119028752 | 9.39 MB

Hack your antivirus software to stamp out future vulnerabilities
The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense.
You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software-all of which can help you strengthen your network and protect your data.

While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network.

Discover how to reverse engineer your antivirus software
Explore methods of antivirus software evasion
Consider different ways to attack and exploit antivirus software
Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software
The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.

Download:

http://longfiles.com/363pal4xn63n/The_Antivirus_Hacker's_Handbook.pdf.html

[Fast Download] The Antivirus Hacker's Handbook


Related eBooks:
U.S. Marine Close Combat Fighting Handbook
Decrypted Secrets: Methods and Maxims of Cryptology
Computer Information Systems and Industrial Management
Social Engineering: Hacking Systems, Nations, and Societies
The Complete WiFi Ethical Hacking Course for Beginners
Machine Learning for Cyber Security
Hacker Cracker
Introduction to Biometrics
Machine Learning and Data Mining for Computer Security: Methods and Applications
XSS Attacks: Cross Site Scripting Exploits and Defense
Intrusion Detection: Network Security Beyond the Firewall
Computer Security Fundamentals, 3rd Edition
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.