Antivirus bypass techniques learn practical techniques and tactics to combat, bypass, and evade antivirus software

Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques. Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a...

Full description

Bibliographic Details
Main Author: Yehoshua, Nir
Other Authors: Kosayev, Uriel
Format: eBook
Language:English
Published: Birmingham, UK Packt Publishing Limited, 2021.
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 03487cam a2200481Ki 4500
001 koha001013597
003 OCoLC
005 20250222070006.0
006 m d
007 cr cnu---unuuu
008 210718s2021 enk o 000 0 eng d
035 |a koha001013597 
040 |a YDX  |b eng  |e rda  |c YDX  |d UKAHL  |d EBLCP  |d UKMGB  |d OCLCF  |d N$T  |d YDX 
015 |a GBC177914  |2 bnb 
016 7 |a 020196397  |2 Uk 
019 |a 1262321111  |a 1276795647 
020 |a 9781801075602  |q electronic book 
020 |a 1801075603  |q electronic book 
020 |z 9781801079747 
020 |z 1801079749 
037 |a 9781801075602  |b Packt Publishing Pvt. Ltd 
050 4 |a QA76.76.C68  |b Y44 2021 
082 0 4 |a 005.8  |2 23 
049 |a MAIN 
100 1 |a Yehoshua, Nir,  |9 911986 
245 1 0 |a Antivirus bypass techniques  |b learn practical techniques and tactics to combat, bypass, and evade antivirus software  |c Nir Yehoshua, Uriel Kosayev. 
264 1 |a Birmingham, UK  |b Packt Publishing Limited,  |c 2021. 
300 |a 1 online resource 
520 |a Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques. Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivirus bypass techniques that will enable you to bypass antivirus solutions.The book starts by introducing you to the cybersecurity landscape, focusing on cyber threats, malware, and more. You will learn how to collect leads to research antivirus and explore the two common bypass approaches used by the authors. Once you've covered the essentials of antivirus research and bypassing, you'll get hands-on with bypassing antivirus software using obfuscation, encryption, packing, PowerShell, and more. Toward the end, the book covers security improvement recommendations, useful for both antivirus vendors as well as for developers to help strengthen the security and malware detection capabilities of antivirus software. By the end of this security book, you'll have a better understanding of antivirus software and be able to confidently bypass antivirus software. This book is for security researchers, malware analysts, reverse engineers, pentesters, antivirus vendors looking to strengthen their detection capabilities, antivirus users and companies that want to test and evaluate their antivirus software, organizations that want to test and evaluate antivirus software before purchase or acquisition, and tech-savvy individuals who want to learn new topics. 
653 0 |a Computer networks  |x Security measures  |v Software. 
653 0 |a Computer viruses  |x Prevention. 
653 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
653 7 |a Computer viruses  |x Prevention.  |2 fast  |0 (OCoLC)fst00872686 
655 0 |a EBSCO eBooks  |9 905790 
655 0 |a Electronic books.  |9 899821 
655 4 |a Electronic books.  |9 899821 
655 7 |a Software.  |2 fast  |0 (OCoLC)fst01411640  |9 911987 
700 1 |a Kosayev, Uriel,  |9 911988 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/2966709.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013597 
910 |a EBSCO eBooks 
999 |c 1013597  |d 1013597 
039