Find Every Torrent You Need – Private, Fast, and Reliable!
https://www.Torrenting.com

Gagniuc P. Antivirus Engines. From Methods to Innovations, Design, and Apps 2025

Download!Download this torrent!

Gagniuc P. Antivirus Engines. From Methods to Innovations, Design, and Apps 2025

To start this P2P download, you have to install a BitTorrent client like qBittorrent

Category: Other
Total size: 47.93 MB
Added: 2025-03-10 23:39:10

Share ratio: 11 seeders, 4 leechers
Info Hash: EE0C84F5A64D7B7404CF94D8743F4EDBC456C1B4
Last updated: 17.6 minutes ago

Description:

Textbook in PDF format Antivirus Engines: From Methods to Innovations, Design, and Applications offers an in-depth exploration of the core techniques employed in modern antivirus software. It provides a thorough technical analysis of detection methods, algorithms, and integration strategies essential for the development and enhancement of antivirus solutions. The examples provided are written in Python, showcasing foundational, native implementations of key concepts, allowing readers to gain practical experience with the underlying mechanisms of antivirus technology. The text covers a wide array of scanning techniques, including heuristic and smart scanners, hexadecimal inspection, and cryptographic hash functions such as MD5 and SHA for file integrity verification. These implementations highlight the crucial role of various scanning engines, from signature-based detection to more advanced models like behavioral analysis and heuristic algorithms. Each chapter provides clear technical examples, demonstrating the integration of modules and methods required for a comprehensive antivirus system, addressing both common and evolving threats. Beyond simple virus detection, the content illustrates how polymorphic malware, ransomware, and state-sponsored attacks are tackled using multi-layered approaches. Through these examples, students, researchers, and security professionals gain practical insight into the operation of antivirus engines, enhancing their ability to design or improve security solutions in a rapidly changing threat environment. Chapter 1 History Chapter 2 The internet Chapter 3 Operating systems Chapter 4 Operating system APIs Chapter 5 Cryptography Chapter 6 Exploits Chapter 7 Malware types and classification Chapter 8 Antivirus engines Chapter 9 Algorithms Chapter 10 MD5/SHA signatures and scanners ... Chapter 14 Smart scanners and rabbit holes Chapter 15 Process and user behavior Chapter 16 The network Appendices Appendix 1—Executable file extensions Appendix 2—PWM to JSON Appendix 3—File headers Appendix 4—Running processes Appendix 5—Hidden windows Appendix 6—Registry snapshots Appendix 7—Registry key list Appendix 8—Built-in tools and utilities Appendix 9—CMD built-in commands Appendix 10—A general overview of Scut Antivirus Appendix 10—Words of wisdom