9781449626365-144962636X-The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System

ISBN-13: 9781449626365
ISBN-10: 144962636X
Edition: 2
Author: Bill Blunden
Publication date: 2012
Publisher: Jones & Bartlett Learning
Format: Paperback 784 pages
FREE US shipping
Buy

From $113.53

Book details

ISBN-13: 9781449626365
ISBN-10: 144962636X
Edition: 2
Author: Bill Blunden
Publication date: 2012
Publisher: Jones & Bartlett Learning
Format: Paperback 784 pages

Summary

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System (ISBN-13: 9781449626365 and ISBN-10: 144962636X), written by authors Bill Blunden, was published by Jones & Bartlett Learning in 2012. With an overall rating of 4.2 stars, it's a notable title among other Computer Science (Internet, Groupware, & Telecommunications, Networking & Cloud Computing, Network Security, Security & Encryption, Hacking, Viruses, Privacy & Online Safety) books. You can easily purchase or rent The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System (Paperback) from BooksRun, along with many other new and used Computer Science books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $16.65.

Description

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.

The range of topics presented includes how to:
-Evade post-mortem analysis
-Frustrate attempts to reverse engineer your command & control modules
-Defeat live incident response
-Undermine the process of memory analysis
-Modify subsystem internals to feed misinformation to the outside
-Entrench your code in fortified regions of execution
-Design and implement covert channels
-Unearth new avenues of attack

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book