Beginning Linux Antivirus Development


Download Beginning Linux Antivirus Development PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Beginning Linux Antivirus Development book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Beginning Linux Antivirus Development


Beginning Linux Antivirus Development

Author: Ian Lee

language: en

Publisher: schoolime

Release Date: 2017-12-14


DOWNLOAD





This is the world’s first book that you have never read on how to develop security software. It is said that we are striding into the initial era of the internet of things, but I believe we are in the middle of the IoT now. Smart watches, tablets for note-taking in class, Smart TVs allowing us to see popular soap dramas, game consoles to play games with your friends, e-books you read before you go to bed and smartphones you always look at to name but a few. We are using different types of computer systems which are all connected day and night. But, have you ever wondered how many gadgets among those things are applied to security technologies? In reality, not many devices are introduced to the technologies. Also, many people say that security is important in the era of IoT while they tell us that it is essential that the vulnerability of IoT should be removed. So much so that, they focus on getting rid of vulnerabilities. Of course, the concentration of vulnerability can’t be ruled out. But, adding a new feature to software breed another new vulnerability. Even so, security technologies for commercial antivirus programs can’t apply to all IoT devices. If that’s the case, what if IoT software developers create a security function for their devices on their own and apply it to theirs? This is the first book that navigates you through the detail on how to develop security software functions. What you can get from this book. While you are reading this book, you will find yourself to implement a simple antivirus software and an antivirus server by yourself. You may be still wondering if that is going to happen to you. You can check out a demo video at the website as below. I am sure that you will be encouraged to do the same after watching it. http://www.schoolime.com/securityschool/antivirus/demo/ You might think that this book simply explains code like any other books. The answer is no. This is a story about a student with no experience in security who grows into a security software developer. Starting with a plausible hacking incident, the main character in this book collects requirements, draws a design and writes code. By doing so, he goes through the entire process. You can also get the knowledge as below after you finish this book. - The basics of antivirus structure - Requirement-driven development - Practical software design using UML - How to modify kernels for security Don't worry, any developers can read this book. You can be a security software developer. Do you think those words are tricky for you? No worries. This book walks you through every process so that anyone who has the basic knowledge as below can easily understand the book. You will find yourself to be a security software developer after finishing this book. - C programming - Simple echo socket programming - UML (It’s enough to hear of it. No necessary to handle it) - The role of Linux kernels (No necessary to develop it) There is a first for everyone.

The Antivirus Hacker's Handbook


The Antivirus Hacker's Handbook

Author: Joxean Koret

language: en

Publisher: John Wiley & Sons

Release Date: 2015-09-28


DOWNLOAD





Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software—all of which can help you strengthen your network and protect your data. While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network. Discover how to reverse engineer your antivirus software Explore methods of antivirus software evasion Consider different ways to attack and exploit antivirus software Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.

Malware Development for Ethical Hackers


Malware Development for Ethical Hackers

Author: Zhassulan Zhussupov

language: en

Publisher: Packt Publishing Ltd

Release Date: 2024-06-28


DOWNLOAD





Packed with real-world examples, this book simplifies cybersecurity, delves into malware development, and serves as a must-read for advanced ethical hackers Get With Your Book: PDF Copy, AI Assistant, and Next-Gen Reader Free Key Features Learn how to develop and program Windows malware applications using hands-on examples Explore methods to bypass security mechanisms and make malware undetectable on compromised systems Understand the tactics and tricks of real adversaries and APTs and apply their experience in your operations Book DescriptionMalware Development for Ethical Hackers is a comprehensive guide to the dark side of cybersecurity within an ethical context. This book takes you on a journey through the intricate world of malware development, shedding light on the techniques and strategies employed by cybercriminals. As you progress, you’ll focus on the ethical considerations that ethical hackers must uphold. You’ll also gain practical experience in creating and implementing popular techniques encountered in real-world malicious applications, such as Carbanak, Carberp, Stuxnet, Conti, Babuk, and BlackCat ransomware. This book will also equip you with the knowledge and skills you need to understand and effectively combat malicious software. By the end of this book, you'll know the secrets behind malware development, having explored the intricate details of programming, evasion techniques, persistence mechanisms, and more.What you will learn Familiarize yourself with the logic of real malware developers for cybersecurity Get to grips with the development of malware over the years using examples Understand the process of reconstructing APT attacks and their techniques Design methods to bypass security mechanisms for your red team scenarios Explore over 80 working examples of malware Get to grips with the close relationship between mathematics and modern malware Who this book is for This book is for penetration testers, exploit developers, ethical hackers, red teamers, and offensive security researchers. Anyone interested in cybersecurity and ethical hacking will also find this book helpful. Familiarity with core ethical hacking and cybersecurity concepts will help you understand the topics discussed in this book more easily.