Sold Out
Book Categories |
Part I Malware Case Study: Please Review This Before Our Quarterly Meeting Chapter 1 Method of Infection Chapter 2 Malware Functionality Part II Rootkits Case Study: The Invisible Rootkit That Steals Your Bank Account Data Chapter 3 User-Mode Rootkits Chapter 4 Kernel-Mode Rootkits Chapter 5 Virtual Rootkits Chapter 6 The Future of Rootkits: If You Think It's Bad Now Part III Prevention Technologies Case Study: A Wolf In Sheep's Clothing Chapter 7 Antivirus Chapter 8 Host Protection Systems Chapter 9 Host-Based Intrusion Prevention Chapter 10 Rootkit Detection Chapter 11 General Security Practices Appendix A System Integrity Analysis: Building Your Own Rootkit Detector Index
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionHacking Exposed Malware & Rootkits: Security Secrets & Solutions
X
This Item is in Your InventoryHacking Exposed Malware & Rootkits: Security Secrets & Solutions
X
You must be logged in to review the productsX
X
X
Add Hacking Exposed Malware & Rootkits: Security Secrets & Solutions, A harrowing guide to where the bad guys hide, and how you can find them. —Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greates, Hacking Exposed Malware & Rootkits: Security Secrets & Solutions to the inventory that you are selling on WonderClubX
X
Add Hacking Exposed Malware & Rootkits: Security Secrets & Solutions, A harrowing guide to where the bad guys hide, and how you can find them. —Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greates, Hacking Exposed Malware & Rootkits: Security Secrets & Solutions to your collection on WonderClub |