000 -LEADER |
fixed length control field |
02034cam a2200385 i 4500 |
001 - CONTROL NUMBER |
control field |
18684305 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220628150148.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150702t20152015inua 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2015945503 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119028758 |
Qualifying information |
paperback |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn900793411 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BTCTA |
Language of cataloging |
eng |
Transcribing agency |
BTCTA |
Description conventions |
rda |
Modifying agency |
BDX |
-- |
YDXCP |
-- |
CDX |
-- |
IAD |
-- |
OCLCO |
-- |
FM0 |
-- |
UMS |
-- |
OCLCF |
-- |
CDN |
-- |
DLC |
-- |
UOC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.84 |
Edition number |
23 |
Item number |
JOX |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Koret, Joxean |
Relator term |
author. |
9 (RLIN) |
839 |
245 14 - TITLE STATEMENT |
Title |
The antivirus hacker's handbook / |
Statement of responsibility, etc. |
Joxean Koret, Elias Bachaalany. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Indianapolis, IN : |
Name of producer, publisher, distributor, manufacturer |
John Wiley & Sons Inc., |
Date of production, publication, distribution, manufacture, or copyright notice |
[2015]. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Date of production, publication, distribution, manufacture, or copyright notice |
©2015 by John Wiley & Sons Inc. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 359 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Antivirus basics -- Introduction to antivirus software -- Revere-engineering the core -- The plug-ins system -- Understanding antivirus signatures -- The update system -- Antivirus software evasion -- Evading signatures -- Evading scanners -- Evading heuristic engines -- Identifying the attack surface -- Denial of service -- Analysis and exploitation -- Static analysis -- Dynamic analysis -- Local exploitation -- Remote exploitation -- Current trends and recommendations -- Current trends in antivirus protection -- Recommendations and the possible future. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight."-- Back cover. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer viruses. |
9 (RLIN) |
3215 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Hackers. |
9 (RLIN) |
135 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
9 (RLIN) |
3167 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Bachaalany, Elias |
Relator term |
author. |
9 (RLIN) |
840 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Book |