libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

hoglund g.; butler j. - rootkits
Zoom

ROOTKITS SUBVERTING THE WINDOWS KERNEL

;




Disponibilità: Non disponibile o esaurito presso l'editore


PREZZO
39,95 €



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, Carta della Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 07/2005





Trama

"It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits."
"--Mark Russinovich, editor," Windows IT Pro / Windows & .NET Magazine

"This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, "Rootkits" will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."
"--Tony Bautts, Security Consultant; CEO, Xtivix, Inc."

"This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."
"--Jennifer Kolde, Security Consultant, Author, and Instructor"

"What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coveragetools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight.
"Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on s











Altre Informazioni

ISBN:

9780321294319

Condizione: Nuovo
Collana: Addison-Wesley Software Securi
Dimensioni: 9.00 x 7.00 x 1.00 inch.
Formato: Paperback
Pagine Arabe: 324


Dicono di noi