×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software Nir Yehoshua, Uriel Kosayev

(ebook) (audiobook) (audiobook) Książka w języku 1
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software Nir Yehoshua, Uriel Kosayev - okladka książki

Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software Nir Yehoshua, Uriel Kosayev - okladka książki

Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software Nir Yehoshua, Uriel Kosayev - audiobook MP3

Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software Nir Yehoshua, Uriel Kosayev - audiobook CD

Autorzy:
Nir Yehoshua, Uriel Kosayev
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
242
Dostępne formaty:
     PDF
     ePub
     Mobi
Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivirus bypass techniques that will enable you to bypass antivirus solutions.
The book starts by introducing you to the cybersecurity landscape, focusing on cyber threats, malware, and more. You will learn how to collect leads to research antivirus and explore the two common bypass approaches used by the authors. Once you’ve covered the essentials of antivirus research and bypassing, you'll get hands-on with bypassing antivirus software using obfuscation, encryption, packing, PowerShell, and more. Toward the end, the book covers security improvement recommendations, useful for both antivirus vendors as well as for developers to help strengthen the security and malware detection capabilities of antivirus software.
By the end of this security book, you'll have a better understanding of antivirus software and be able to confidently bypass antivirus software.

Wybrane bestsellery

O autorach książki

Nir Yehoshua is an Israeli security researcher with more than 8 years of experience in several information security fields. His specialties include vulnerability research, malware analysis, reverse engineering, penetration testing, and incident response. He is an alumnus of an elite security research and incident response team in the Israel Defense Forces. Today, Nir is a full-time bug bounty hunter and consults for Fortune 500 companies, aiding them in detecting and preventing cyber-attacks. Over the years, Nir has discovered security vulnerabilities in several companies, including FACEIT, Bitdefender, McAfee, Intel, Bosch, and eScan Antivirus, who have mentioned him in their Hall of Fame.
Uriel Kosayev is an Israeli security researcher with over eight years of experience in the cybersecurity field. Uriel is the author of the Antivirus Bypass Techniques book and a lecturer who has developed courses in the cybersecurity field. Uriel has hands-on experience in malware research, reverse engineering, penetration testing, digital forensics, and incident response. During his army service, Uriel worked to strengthen an elite incident response team in both practical and methodological ways.

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
98,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.