Books: Difference between revisions

[unchecked revision][unchecked revision]
Line 467:
|title=The Art of Computer Virus Research and Defense
|author=Peter Szor
|year=2005
|supp=[http://www.informit.com/store/product.aspx?isbn=0321304543 Link]
|description=Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, '''''The Art of Computer Virus Research and Defense''''' is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more.
Line 486 ⟶ 487:
|title=Reversing: Secrets of Reverse Engineering
|author=Eldad Eilam
|year=2005
|supp=[http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0764574817.html Link]
|description=Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
Line 497 ⟶ 499:
|title=Security Engineering, 2nd ed.
|author=Ross Anderson
|year=2008
|supp=[http://www.cl.cam.ac.uk/~rja14/book.html Link]
|description=The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
Line 510 ⟶ 513:
|title=Applied Cryptography, 2nd ed.
|author=Bruce Schneier
|year=
|supp=[http://www.schneier.com/book-applied.html Link]
|description=This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography -- the technique of enciphering and deciphering messages -- to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
Anonymous user