Amazon Price: N/A (as of January 20, 2018 01:00 –
Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more.
Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats.
Continue reading “The Art of Computer Virus Research and Defense”
Amazon Price: $64.58 (as of January 20, 2018 08:22 –
• CLEAR & CONCISE: Tight case editing, focused questions, and topical problems direct students' attention to the most critical issues. The book covers the full sweep of the subject, but is still short enough that the core topics can be taught in a 3-credit survey course. • UP-TO-DATE COVERAGE: The Fifth Edition features an extensively rewritten section on network neutrality that covers the FCC's second Open Internet order, a revised section on the NSA covering developments through the USA FREEDOM Act, and heavily updated coverage of developments in free-speech law. New cases deal with issues including online service of process, international comity, cyberbullying, privacy class actions, domain-name injunctions, and first sale; new and revised notes cover protections for the institutional press, spam laws, the ICANN gTLD expansion, and the triennial DMCA exemption rulemaking process. • INTERNET LAW AS A CAPSTONE COURSE: The book embraces the doctrinal diversity of Internet Law. It prepares students for the complexity of real-life legal practice by showing how actual Internet cases raise interrelated problems from all throughout the law. • TECHNICAL AND HISTORICAL NOTES: Mini-essays throughout the book provide the essential technical background needed to make sense of computer and Internet technologies. Where modern doctrine has important historical roots (e.g., network neutrality and telecommunications regulation), the book gives the necessary context.