Chargement en cours…

Rootkits : subverting the Windows kernel /

"It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly...

Description complète

Détails bibliographiques
Cote:Libro Electrónico
Auteur principal: Hoglund, Greg
Autres auteurs: Butler, James
Format: Électronique eBook
Langue:Inglés
Publié: Upper Saddle River, NJ : Addison-Wesley, 2005.
Sujets:
Accès en ligne:Texto completo (Requiere registro previo con correo institucional)
Table des matières:
  • 1. Leave no trace
  • 2. Subverting the kernel
  • 3. hardware connection
  • 4. age-old art of hooking
  • 5. Runtime patching
  • 6. Layered drivers
  • 7. Direct kernel object manipulation
  • 8. Hardware manipulation
  • 9. Covert channels
  • 10. Rootkit detection.