<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>01464nam a2200205Ia 4500</leader>
  <controlfield tag="001">CTU_100499</controlfield>
  <controlfield tag="008">210402s9999    xx            000 0 und d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="c">648000</subfield>
  </datafield>
  <datafield tag="082" ind1=" " ind2=" ">
   <subfield code="a">005.8</subfield>
  </datafield>
  <datafield tag="082" ind1=" " ind2=" ">
   <subfield code="b">S998</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
   <subfield code="a">Szor, Peter</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2="4">
   <subfield code="a">The art of computer virus research and defense</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2="0">
   <subfield code="c">Peter Szor</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Upper Saddle River</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="b">Addison-Wesley</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="c">2005</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Peter Szor takes you behind the scenes of anti-virus research, showing howthey are analyzed, how they spread, and--most importantly--how to effectivelydefend against them. This book offers an encyclopedic treatment of thecomputer virus, including: a history of computer viruses, virus behavior,classification, protection strategies, anti-virus and worm-blocking techniques,and how to conduct an accurate threat analysis. The Art of Computer VirusResearch and Defense entertains readers with its look at anti-virus research, butmore importantly it truly arms them in the fight against computer viruses.As one of the lead researchers behind Norton AntiVirus, the most popularantivirus program in the industry, Peter Szor studies viruses every day. Byshowing how viruses really work, this book will help security professionals andstudents protect against them, recognize them, and analyze and limit thedamage they can do.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
   <subfield code="a">Computer viruses,Computer security</subfield>
  </datafield>
  <datafield tag="904" ind1=" " ind2=" ">
   <subfield code="i">Giang</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
   <subfield code="a">Trung tâm Học liệu Trường Đại học Cần Thơ</subfield>
  </datafield>
 </record>
</collection>
