Free delivery for purchases over 59.99 €
Slovak post 4.49 SPS courier 4.99 Packeta courier 4.99 Packeta point 2.99 SPS Parcel Shop 2.99

Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

Language EnglishEnglish
Book Paperback
Book Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System Blunden
Libristo code: 01234200
Publishers Jones and Bartlett Publishers, March 2012
While forensic analysis has proven to be a valuable investigative tool in the field of computer secu... Full description
? points 330 b
133.56
In stock at our supplier Shipping in 14-18 days

30-day return policy


Customers also purchased


C# 7.0 w pigułce Albahari Joseph / Hardback
common.buy 28.67

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented. The range of topics presented includes how to: -Evade post-mortem analysis -Frustrate attempts to reverse engineer your command & control modules -Defeat live incident response -Undermine the process of memory analysis -Modify subsystem internals to feed misinformation to the outside -Entrench your code in fortified regions of execution -Design and implement covert channels -Unearth new avenues of attack

About the book

Full name Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Author Blunden
Language English
Binding Book - Paperback
Date of issue 2012
Number of pages 784
EAN 9781449626365
ISBN 144962636X
Libristo code 01234200
Weight 1166
Dimensions 228 x 162 x 39
Give this book today
It's easy
1 Add to cart and choose Deliver as present at the checkout 2 We'll send you a voucher 3 The book will arrive at the recipient's address

You might also be interested in


TOP
Hacking: The Art Of Exploitation Jon Erickson / Paperback
common.buy 47.11
TOP
Windows Internals Pavel Yosifovich / Paperback
common.buy 49.97
TOP
Windows Kernel Programming Pavel Yosifovich / Paperback
common.buy 46.39
Hacker Playbook Peter Kim / Paperback
common.buy 29.80
Practical Malware Analysis Michael Sikorski / Paperback
common.buy 57.55
Attacking Network Protocols James Forshaw / Paperback
common.buy 44.03
Rootkits And Bootkits Alex Matrosov / Paperback
common.buy 41.06
Metasploit David Kennedy / Paperback
common.buy 45.47
Windows Internals, Part 2 Mark Russinovich / Paperback
common.buy 49.97
Reversing - Secrets of Reverse Engineering Eldad Eilam / Paperback
common.buy 35.84
Art Of Assembly Language, 2nd Edition Randall Hyde / Paperback
common.buy 49.77
Advanced Persistent Threat Hacking Tyler Wrightson / Paperback
common.buy 50.28

Login

Log in to your account. Don't have a Libristo account? Create one now!

 
mandatory
mandatory

Don’t have an account? Discover the benefits of having a Libristo account!

With a Libristo account, you'll have everything under control.

Create a Libristo account