Rootkits : subverting the Windows kernel /
"It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Hoglund, Greg |
Otros Autores: | Butler, James |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Upper Saddle River, NJ :
Addison-Wesley,
2005.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Learning Microsoft Windows Server 2012 Dynamic Access Control.
por: Nickel, Jochen
Publicado: (2013) -
Learning Microsoft Windows Server 2012 Dynamic Access Control.
por: Nickel, Jochen
Publicado: (2013) -
Mastering Windows Server 2012 R2 /
Publicado: (2014) -
Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis /
por: Bramwell, Phil
Publicado: (2018) -
Windows Vista security : securing Vista against malicious attacks /
por: Grimes, Roger A., et al.
Publicado: (2007)