Foto 1 di 11










Galleria
Foto 1 di 11











Ne hai uno da vendere?
Professional Rootkits by Ric Vieler (2007, Paperback)
US $14,00
CircaEUR 12,15
o Proposta d'acquisto
Condizione:
“Acceptable to good condition with wear. There is a taped tear on front cover. The rest of book ”... Maggiori informazioniinformazioni sulla condizione
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Spedizione:
US $5,97 (circa EUR 5,18) USPS Media MailTM.
Oggetto che si trova a: Ore City, Texas, Stati Uniti
Risparmia con la spedizione combinata
Consegna:
Consegna prevista tra il ven 7 nov e il mer 12 nov a 94104
Restituzioni:
Restituzioni non accettate.
Pagamenti:
Fai shopping in tutta sicurezza
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:255743205945
Specifiche dell'oggetto
- Condizione
- Accettabile
- Note del venditore
- Country of Origin
- United States
- Educational Level
- Adult & Further Education
- Level
- Intermediate, Advanced
- Original/Facsimile
- Original
- ISBN
- 9780470101544
Informazioni su questo prodotto
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0470101547
ISBN-13
9780470101544
eBay Product ID (ePID)
57196221
Product Key Features
Number of Pages
360 Pages
Publication Name
Professional Rootkits
Language
English
Subject
Security / General, Operating Systems / Windows Desktop
Publication Year
2007
Type
Textbook
Subject Area
Computers
Format
Perfect
Dimensions
Item Height
0.8 in
Item Weight
17.6 Oz
Item Length
9.2 in
Item Width
7.5 in
Additional Product Features
Intended Audience
Trade
LCCN
2006-101977
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Foreword.Preface.Acknowledgements.Author Bios.Introduction.1. Tools.2. A Base-Rootkit.3. Kernal Hooks.4. User Hooks.5. IO Processing.6. Communications.7. Filter Drivers.8. Key-Logging.9. Concealment.10. Email Filtering.11. Installation Considrations.12. Ghost Tracker.13. Detecting Rootkits.14. Preventing Rootkits.Appendic.Index.License Agreement(S).CD Installation Instructions.
Synopsis
Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before it's installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned andwritten by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job., Whether you want to learn how to develop a robust, full-featured rootkit or youre looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools youll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before its installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job., Whether you want to learn how to develop a robust, full-featured rootkit or youre looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools youll need., Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before it's installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.
LC Classification Number
QA76.9.A25V56 2007
Descrizione dell'oggetto fatta dal venditore
Informazioni su questo venditore
2B Read Again Books and More
100% di Feedback positivi•156 oggetti venduti
Registrato come venditore privatoPertanto non si applicano i diritti dei consumatori derivanti dalla normativa europea. La Garanzia cliente eBay è comunque applicabile alla maggior parte degli acquisti. Scopri di piùScopri di più
Feedback sul venditore (57)
- 3***9 (678)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoFast despatch and received well packaged, as described/pictured and lovely communication - thanks for your kind note and great order! Much appreciated from the UK! 🫶🏻Elizabeth Cadbury 1858-1951 By Richenda Scott 1956 2nd Impression Hardcover w/DJ (N° 255679256407)
- y***e (748)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoItem as described. Fast shipping. Well packaged. Thank you so much
- l***s (59)- Feedback lasciato dall'acquirente.Ultimo annoAcquisto verificatoThe appearance in the photo is good and the seller description matched the product delivered. The book is in very good quality and the correct condition stated. The seller took care in packaging which a great value. This is a Great Seller.Writing with Clarity and Style : A Guide to Rhetorical Devices for... (N° 256682883798)

