Bild 1 von 11










Galerie
Bild 1 von 11











Professional Rootkits by Ric Vieler (2007, Paperback)
US $14,00
Ca.EUR 12,19
oder Preisvorschlag
Artikelzustand:
“Acceptable to good condition with wear. There is a taped tear on front cover. The rest of book ”... Mehr erfahrenÜber den Artikelzustand
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
US $5,97 (ca. EUR 5,20) USPS Media MailTM.
Standort: Ore City, Texas, USA
Bei Kombiversand sparen
Lieferung:
Lieferung zwischen Sa, 8. Nov und Sa, 15. Nov nach 94104 bei heutigem Zahlungseingang
Rücknahme:
Keine Rücknahme.
Zahlungen:
Sicher einkaufen
- Gratis Rückversand im Inland
- Punkte für jeden Kauf und Verkauf
- Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:255743205945
Artikelmerkmale
- Artikelzustand
- Akzeptabel
- Hinweise des Verkäufers
- Country of Origin
- United States
- Educational Level
- Adult & Further Education
- Level
- Intermediate, Advanced
- Original/Facsimile
- Original
- ISBN
- 9780470101544
Über dieses Produkt
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0470101547
ISBN-13
9780470101544
eBay Product ID (ePID)
57196221
Product Key Features
Number of Pages
360 Pages
Publication Name
Professional Rootkits
Language
English
Subject
Security / General, Operating Systems / Windows Desktop
Publication Year
2007
Type
Textbook
Subject Area
Computers
Format
Perfect
Dimensions
Item Height
0.8 in
Item Weight
17.6 Oz
Item Length
9.2 in
Item Width
7.5 in
Additional Product Features
Intended Audience
Trade
LCCN
2006-101977
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Foreword.Preface.Acknowledgements.Author Bios.Introduction.1. Tools.2. A Base-Rootkit.3. Kernal Hooks.4. User Hooks.5. IO Processing.6. Communications.7. Filter Drivers.8. Key-Logging.9. Concealment.10. Email Filtering.11. Installation Considrations.12. Ghost Tracker.13. Detecting Rootkits.14. Preventing Rootkits.Appendic.Index.License Agreement(S).CD Installation Instructions.
Synopsis
Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before it's installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned andwritten by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job., Whether you want to learn how to develop a robust, full-featured rootkit or youre looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools youll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before its installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job., Whether you want to learn how to develop a robust, full-featured rootkit or youre looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools youll need., Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before it's installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.
LC Classification Number
QA76.9.A25V56 2007
Artikelbeschreibung des Verkäufers
Info zu diesem Verkäufer
2B Read Again Books and More
100% positive Bewertungen•156 Artikel verkauft
Angemeldet als privater VerkäuferDaher finden verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe. Mehr erfahrenMehr erfahren
Verkäuferbewertungen (57)
- 3***9 (678)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufFast despatch and received well packaged, as described/pictured and lovely communication - thanks for your kind note and great order! Much appreciated from the UK! 🫶🏻Elizabeth Cadbury 1858-1951 By Richenda Scott 1956 2nd Impression Hardcover w/DJ (Nr. 255679256407)
- y***e (748)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufItem as described. Fast shipping. Well packaged. Thank you so much
- l***s (59)- Bewertung vom Käufer.Letztes JahrBestätigter KaufThe appearance in the photo is good and the seller description matched the product delivered. The book is in very good quality and the correct condition stated. The seller took care in packaging which a great value. This is a Great Seller.Writing with Clarity and Style : A Guide to Rhetorical Devices for... (Nr. 256682883798)
Noch mehr entdecken:
- Luanne Rice Belletristik-Bücher,
- Sachbuch Anne Rice Bücher,
- Edgar-Rice-Burroughs-Belletristik - Bücher,
- Anne Rice Belletristik-Bücher,
- Anne-Rice-Fantasy-Belletristik - Bücher,
- Bücher über Literatur Anne Rice Belletristik,
- Belletristik-Bücher der 1900er Anne Rice,
- Fantasy Bücher Anne Rice Belletristik Literatur,
- Anne-Rice-Horror-Belletristik - Bücher,
- Anne-Rice-Horror-Belletristik - Bücher auf Deutsch

