Theory: Understanding how antiviruses detect threats, Signatures

Please see the PDF attached