|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn968714981 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
170116s2017 nyua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d OCLCA
|d TOH
|d C6I
|d EBLCP
|d OCLCO
|d CZL
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1164495312
|
020 |
|
|
|a 9780071825757
|
020 |
|
|
|a 0071825754
|
020 |
|
|
|z 9780071823074
|
029 |
1 |
|
|a AU@
|b 000069005702
|
035 |
|
|
|a (OCoLC)968714981
|z (OCoLC)1164495312
|
037 |
|
|
|a CL0500000818
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Davis, Michael,
|d 1982-
|e author.
|
245 |
1 |
0 |
|a Hacking exposed :
|b malware and rootkits : security secrets & solutions /
|c Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a New York :
|b McGraw-Hill Education,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Hacking Exposed Ser.
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from title page (viewed January 13, 2017).
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I Malware -- CASE STUDY: Please Review This Before Our Quarterly Meeting -- 1 Malware Propagation -- Malware Is Still King -- The Spread of Malware -- Why They Want Your Workstation -- Intent Is Hard to Detect -- It's a Business -- Significant Malware Propagation Techniques -- Social Engineering -- File Execution -- Modern Malware Propagation Techniques -- StormWorm -- Metamorphism -- Obfuscation -- Dynamic Domain Name Services -- Fast Flux
|
505 |
8 |
|
|a Malware Propagation Injection Vectors -- Email -- Malicious Websites -- Phishing -- Peer-to-Peer (P2P) -- Worms -- Summary -- 2 Malware Functionality -- What Malware Does Once It's Installed -- Pop-ups -- Search Engine Redirection -- Data Theft -- Click Fraud -- Identity Theft -- Keylogging -- Malware Behaviors -- Identifying Installed Malware -- Typical Install Locations -- Installing on Local Drives -- Modifying Timestamps -- Affecting Processes -- Disabling Services -- Modifying the Windows Registry -- Summary -- Part II Rootkits
|
505 |
8 |
|
|a CASE STUDY: The Invisible Rootkit That Steals Your Bank Account Data -- Disk Access -- Firewall Bypassing -- Backdoor Communication -- Intent -- Presence and Significance -- 3 User-Mode Rootkits -- Rootkits -- Timeline -- Major Features of Rootkits -- Types of Rootkits -- User-Mode Rootkits -- What Are User-Mode Rootkits? -- Background Technologies -- Injection Techniques -- Hooking Techniques -- User-Mode Rootkit Examples -- Summary -- 4 Kernel-Mode Rootkits -- Ground Level: x86 Architecture Basics -- Instruction Set Architectures and the Operating System -- Protection Rings
|
505 |
8 |
|
|a Bridging the Rings -- Kernel Mode: The Digital Wild West -- The Target: Windows Kernel Components -- The Win32 Subsystem -- What Are These APIs Anyway? -- The Concierge: NTDLL. DLL -- Functionality by Committee: The Windows Executive (NTOSKRNL. EXE) -- The Windows Kernel (NTOSKRNL. EXE) -- Device Drivers -- The Windows Hardware Abstraction Layer (HAL) -- Kernel Driver Concepts -- Kernel-Mode Driver Architecture -- Gross Anatomy: A Skeleton Driver -- WDF, KMDF, and UMDF -- Kernel-Mode Rootkits -- What Are Kernel-Mode Rootkits? -- Challenges Faced by Kernel-Mode Rootkits -- Methods and Techniques
|
505 |
8 |
|
|a Kernel-Mode Rootkit Samples -- Klog by Clandestiny -- AFX by Aphex -- FU and FUTo by Jamie Butler, Peter Silberman, and C.H.A.O.S -- Shadow Walker by Sherri Sparks and Jamie Butler -- He4Hook by He4 Team -- Sebek by The Honeynet Project -- Summary -- Summary of Countermeasures -- 5 Virtual Rootkits -- Overview of Virtual Machine Technology -- Types of Virtual Machines -- The Hypervisor -- Virtualization Strategies -- Virtual Memory Management -- Virtual Machine Isolation -- Virtual Machine Rootkit Techniques -- Rootkits in the Matrix: How Did We Get Here?! -- What Is a Virtual Rootkit?
|
520 |
|
|
|a Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed"!Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology." Learn how malware infects, survives, and propagates across an enterprise " See how hackers develop malicious code and target vulnerable systems " Detect, neutralize, and remove user-mode and kernel-mode rootkits " Use hypervisors and honeypots to uncover and kill virtual rootkits " Defend against keylogging, redirect, click fraud, and identity theft " Block spear phishing, client-side, and embedded-code exploits " Effectively deploy the latest antivirus, pop-up blocker, and firewall software " Identify and stop malicious processes using IPS solutions
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Malware (Computer software)
|
650 |
|
0 |
|a Rootkits (Computer software)
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Logiciels malveillants.
|
650 |
|
6 |
|a Trousses administrateur pirate.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Malware (Computer software)
|2 fast
|
650 |
|
7 |
|a Rootkits (Computer software)
|2 fast
|
700 |
1 |
|
|a Elisan, Christopher C.,
|e author.
|
700 |
1 |
|
|a Bodmer, Sean,
|e author.
|
700 |
1 |
|
|a LeMasters, Aaron,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Elisan, Christopher C.
|t Hacking Exposed Malware and Rootkits: Security Secrets and Solutions, Second Edition.
|d : McGraw-Hill Education, ©2016
|
830 |
|
0 |
|a Hacking Exposed Ser.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071825757/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6258127
|
994 |
|
|
|a 92
|b IZTAP
|