Cargando…

Managed code rootkits : hooking into runtime environments /

"Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation--Focuses on managed code including Java, .Net, Android Dalvik, a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Metula, Erez
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Syngress, ©2011.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn689007482
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 101203s2011 ne a ob 001 0 eng d
010 |a  2010036631 
040 |a N$T  |b eng  |e pn  |c N$T  |d E7B  |d EBLCP  |d OCLCQ  |d MHW  |d YDXCP  |d OCLCQ  |d REDDC  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d VLB  |d OCLCQ  |d LIV  |d MERUC  |d OCLCQ  |d OCLCA  |d OCLCF  |d INT  |d COO  |d OCLCQ  |d OCLCO  |d WYU  |d OCLCQ  |d VT2  |d OCLCQ  |d BRF  |d LVT  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1065958362  |a 1107349167  |a 1153022743  |a 1229182834  |a 1240526554 
020 |a 9781597495752  |q (electronic bk.) 
020 |a 1597495751  |q (electronic bk.) 
020 |z 9781597495745 
020 |z 1597495743 
020 0 |a 9781282880092  |q (online) 
020 |a 1282880098 
029 1 |a AU@  |b 000048044683 
029 1 |a AU@  |b 000053265791 
029 1 |a CHNEW  |b 000608625 
029 1 |a DEBSZ  |b 372741215 
029 1 |a DEBSZ  |b 430908695 
029 1 |a DKDLA  |b 820120-katalog:9910110310205765 
035 |a (OCoLC)689007482  |z (OCoLC)1065958362  |z (OCoLC)1107349167  |z (OCoLC)1153022743  |z (OCoLC)1229182834  |z (OCoLC)1240526554 
050 4 |a QA76.9.A25  |b M487 2011eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Metula, Erez. 
245 1 0 |a Managed code rootkits :  |b hooking into runtime environments /  |c Erez Metula. 
260 |a Amsterdam ;  |a Boston :  |b Syngress,  |c ©2011. 
300 |a 1 online resource (xiii, 316 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a "Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation--Focuses on managed code including Java, .Net, Android Dalvik, and reviews malware development scenarios"--Provided by publisher. 
505 0 |a Front Cover; Managed Code Rootkits; Copyright; Table of Contents; Acknowledgements; About the Author; Part I: Overview; Chapter 1. Introduction; Chapter 2. Managed Code Rootkits; Part II: Malware Development; Chapter 3. Tools of the Trade; Chapter 4. Runtime Modification; Chapter 5. Manipulating the Runtime; Chapter 6. Extending the Language with a Malware API; Chapter 7. Automated Framework Modification; Chapter 8. Advanced Topics; Part III: Countermeasures; Chapter 9. Defending against MCRs; Part IV: Where Do We Go from Here?; Chapter 10. Other Uses of Runtime Modification; Index. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Common Language Runtime. 
630 0 7 |a Common Language Runtime  |2 fast 
650 0 |a Computers  |x Access control. 
650 0 |a Virtual computer systems  |x Security measures. 
650 0 |a Rootkits (Computer software) 
650 0 |a Computer security. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Systèmes virtuels (Informatique)  |x Sécurité  |x Mesures. 
650 6 |a Trousses administrateur pirate. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a Rootkits (Computer software)  |2 fast 
776 0 8 |i Print version:  |a Metula, Erez.  |t Managed code rootkits.  |d Amsterdam ; Boston : Syngress, ©2011  |z 9781597495745  |w (DLC) 2010036631  |w (OCoLC)635451806 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597495752/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBL - Ebook Library  |b EBLB  |n EBL610554 
938 |a ebrary  |b EBRY  |n ebr10427971 
938 |a EBSCOhost  |b EBSC  |n 345028 
938 |a YBP Library Services  |b YANK  |n 3535371 
994 |a 92  |b IZTAP