Sold Out
Book Categories |
1 | Leave no trace | 1 |
2 | Subverting the kernel | 21 |
3 | The hardware connection | 49 |
4 | The age-old art of hooking | 71 |
5 | Runtime patching | 113 |
6 | Layered drivers | 135 |
7 | Direct kernel object manipulation | 169 |
8 | Hardware manipulation | 213 |
9 | Covert channels | 239 |
10 | Rootkit detection | 295 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionRootkits
X
This Item is in Your InventoryRootkits
X
You must be logged in to review the productsX
X
X
Add Rootkits, Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to, Rootkits to the inventory that you are selling on WonderClubX
X
Add Rootkits, Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to, Rootkits to your collection on WonderClub |