Gagniuc P. Antivirus Engines. From Methods to Innovations, Design, and Apps 2025
Download this torrent!
Gagniuc P. Antivirus Engines. From Methods to Innovations, Design, and Apps 2025
To start this P2P download, you have to install a BitTorrent client like qBittorrent
Category: Other
Total size: 47.93 MB
Added: 2025-03-10 23:39:10
Share ratio:
11 seeders,
4 leechers
Info Hash: EE0C84F5A64D7B7404CF94D8743F4EDBC456C1B4
Last updated: 17.6 minutes ago
Description:
Textbook in PDF format
Antivirus Engines: From Methods to Innovations, Design, and Applications offers an in-depth exploration of the core techniques employed in modern antivirus software. It provides a thorough technical analysis of detection methods, algorithms, and integration strategies essential for the development and enhancement of antivirus solutions. The examples provided are written in Python, showcasing foundational, native implementations of key concepts, allowing readers to gain practical experience with the underlying mechanisms of antivirus technology.
The text covers a wide array of scanning techniques, including heuristic and smart scanners, hexadecimal inspection, and cryptographic hash functions such as MD5 and SHA for file integrity verification. These implementations highlight the crucial role of various scanning engines, from signature-based detection to more advanced models like behavioral analysis and heuristic algorithms. Each chapter provides clear technical examples, demonstrating the integration of modules and methods required for a comprehensive antivirus system, addressing both common and evolving threats.
Beyond simple virus detection, the content illustrates how polymorphic malware, ransomware, and state-sponsored attacks are tackled using multi-layered approaches. Through these examples, students, researchers, and security professionals gain practical insight into the operation of antivirus engines, enhancing their ability to design or improve security solutions in a rapidly changing threat environment.
Chapter 1 History
Chapter 2 The internet
Chapter 3 Operating systems
Chapter 4 Operating system APIs
Chapter 5 Cryptography
Chapter 6 Exploits
Chapter 7 Malware types and classification
Chapter 8 Antivirus engines
Chapter 9 Algorithms
Chapter 10 MD5/SHA signatures and scanners
...
Chapter 14 Smart scanners and rabbit holes
Chapter 15 Process and user behavior
Chapter 16 The network
Appendices
Appendix 1—Executable file extensions
Appendix 2—PWM to JSON
Appendix 3—File headers
Appendix 4—Running processes
Appendix 5—Hidden windows
Appendix 6—Registry snapshots
Appendix 7—Registry key list
Appendix 8—Built-in tools and utilities
Appendix 9—CMD built-in commands
Appendix 10—A general overview of Scut Antivirus
Appendix 10—Words of wisdom