Rootkits : subverting the Windows kernel /
"It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Upper Saddle River, NJ :
Addison-Wesley,
2005.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- 1. Leave no trace
- 2. Subverting the kernel
- 3. hardware connection
- 4. age-old art of hooking
- 5. Runtime patching
- 6. Layered drivers
- 7. Direct kernel object manipulation
- 8. Hardware manipulation
- 9. Covert channels
- 10. Rootkit detection.