Rootkits : subverting the Windows kernel /
"It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly...
Cote: | Libro Electrónico |
---|---|
Auteur principal: | |
Autres auteurs: | |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Upper Saddle River, NJ :
Addison-Wesley,
2005.
|
Sujets: | |
Accès en ligne: | Texto completo (Requiere registro previo con correo institucional) |
Table des matières:
- 1. Leave no trace
- 2. Subverting the kernel
- 3. hardware connection
- 4. age-old art of hooking
- 5. Runtime patching
- 6. Layered drivers
- 7. Direct kernel object manipulation
- 8. Hardware manipulation
- 9. Covert channels
- 10. Rootkit detection.