Books: Difference between revisions

Jump to navigation Jump to search
4,242 bytes added ,  12 years ago
Some books on security. Crypto stuff will follow.
[unchecked revision][unchecked revision]
No edit summary
(Some books on security. Crypto stuff will follow.)
Line 289:
 
= Security =
 
{{Book|ISBN=0321304543|ASIN=0321304543
|title=The Art of Computer Virus Research and Defense
|author=Peter Szor
|supp=[http://www.informit.com/store/product.aspx?isbn=0321304543 Link]
|description=Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, '''''The Art of Computer Virus Research and Defense''''' is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more.
 
Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats.
 
Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes
 
* Discovering how malicious code attacks on a variety of platforms
* Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more
* Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic
* Mastering empirical methods for analyzing malicious code—and what to do with what you learn
* Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines
* Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more
* Using worm blocking, host-based intrusion prevention, and network-level defense strategies
|review=}}
 
{{Book|ISBN=0764574817|ASIN=0764574817
|title=Reversing: Secrets of Reverse Engineering
|author=Eldad Eilam
|supp=[http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0764574817.html Link]
|description=Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
|review=}}
 
{{Book|ISBN=0470068523|ASIN=0470068523
|title=Security Engineering, 2nd ed.
|author=Ross Anderson
|supp=[http://www.cl.cam.ac.uk/~rja14/book.html Link]
|description=The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
|review=}}
 
= Software Engineering =
Line 450 ⟶ 487:
 
* [http://forum.osdev.org/viewtopic.php?f=1&t=6989&p=174472 Book discussions on the forums]
 
[[Category:Resources]]
Anonymous user
Cookies help us deliver our services. By using our services, you agree to our use of cookies.

Navigation menu