,

Antivirus Engines

From Methods to Innovations, Design, and Applications

Paperback Engels 2024 9780443329524
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Antivirus Engines: From Methods to Innovations, Design, and Applications offers an in-depth exploration of the core techniques employed in modern antivirus software. It provides a thorough technical analysis of detection methods, algorithms, and integration strategies essential for the development and enhancement of antivirus solutions. The examples provided are written in Python, showcasing foundational, native implementations of key concepts, allowing readers to gain practical experience with the underlying mechanisms of antivirus technology.

The text covers a wide array of scanning techniques, including heuristic and smart scanners, hexadecimal inspection, and cryptographic hash functions such as MD5 and SHA for file integrity verification. These implementations highlight the crucial role of various scanning engines, from signature-based detection to more advanced models like behavioral analysis and heuristic algorithms. Each chapter provides clear technical examples, demonstrating the integration of modules and methods required for a comprehensive antivirus system, addressing both common and evolving threats.

Beyond simple virus detection, the content illustrates how polymorphic malware, ransomware, and state-sponsored attacks are tackled using multi-layered approaches. Through these examples, students, researchers, and security professionals gain practical insight into the operation of antivirus engines, enhancing their ability to design or improve security solutions in a rapidly changing threat environment.

Specificaties

ISBN13:9780443329524
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

1. History<br>2. The Internet<br>3. Operating systems<br>4. Operating system APIs<br>5. Cryptography<br>6. Exploits<br>7. Malware types and classification<br>8. Antivirus engines<br>9. Algorithms<br>10. MD5/SHA signatures and scanners<br>11. Disinfections, banks and vaults<br>12. Hexadecimal signatures and scanners<br>13. Heuristic signatures and scanners<br>14. Smart scanners and rabbit holes<br>15. Process and user behavior<br>16. The network<br>17. Appendices<br>18. References

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Antivirus Engines