The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2/e
暫譯: 根套件兵器庫:系統黑暗角落中的逃避與躲避,第二版
Bill Blunden
- 出版商: Jones and Bartlett
- 出版日期: 2012-03-16
- 售價: $4,660
- 貴賓價: 9.5 折 $4,427
- 語言: 英文
- 頁數: 784
- 裝訂: Paperback
- ISBN: 144962636X
- ISBN-13: 9781449626365
-
相關分類:
駭客 Hack
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
深入淺出設計模式 (Head First Design Patterns)$880$695 -
C++ Primer, 4/e (中文版)$990$891 -
大話設計模式$620$490 -
鳥哥的 Linux 私房菜-基礎學習篇, 3/e$820$648 -
$1,320Managed Code Rootkits: Hooking into Runtime Environments (Paperback) -
行動裝置嵌入式系統與軟體 (Cortex A8 S5PV210-Android 2.3.4 開發應用實務)$690$621 -
Android 4.X 手機/平板電腦程式設計入門、應用到精通, 2/e (適用 Android 1.X~4.X)$520$411 -
XDA Developers' Android Hacker's Toolkit: The Complete Guide to Rooting, ROMs and Theming (Paperback)$1,225$1,164 -
$199Application Security for the Android Platform: Processes, Permissions, and Other Safeguards (Paperback) -
$990Machine Learning for Hackers (Paperback) -
Linux 開發環境建置-嵌入式系統、Android 系統開發學前教程$480$374 -
Android 系統原理深入解析$520$442 -
JavaScript 大全, 6/e (JavaScript: The Definitive Guide: Activate Your Web Pages, 6/e)$1,200$948 -
笑談軟體工程:敏捷開發法的逆襲-導入 Scrum,讓你的軟體開發人生從黑白變彩色!$550$435 -
實戰封包分析-使用 Wireshark (Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2/e)$450$356 -
The Functional Art: An introduction to information graphics and visualization (Paperback)$1,850$1,813 -
$414支撐處理器的技術-永無止境地追求速度的世界 -
$414軟件自動化測試-入門進階與實戰 -
$479灰帽黑客-正義黑客的道德規範滲透測試攻擊方法和漏洞分析技術, 3/e(Gray Hat Hacking The Ethical Hackers Handbook, 3/e) -
ASP.NET MVC 4 網站開發美學$680$537 -
Arduino UNO R3 開發板(副廠相容版)附傳輸線$400$380 -
BIM 建築資訊建模手冊, 2/e-寫給業主、專案經理、設計師、工程師以及承包商的 BIM 建築資訊建模指南(BIM Handbook, 2/e)$1,500$1,185 -
超圖解 Arduino 互動設計入門, 2/e$680$578 -
Continuous Delivery 中文版:利用自動化的建置、測試與部署完美創造出可信賴的軟體發佈 (Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation)$650$507 -
Android Security Internals: An In-Depth Guide to Android's Security Architecture (Paperback)$1,650$1,568
商品描述
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented. The range of topics presented includes how to: -Evade post-mortem analysis -Frustrate attempts to reverse engineer your command & control modules -Defeat live incident response -Undermine the process of memory analysis -Modify subsystem internals to feed misinformation to the outside -Entrench your code in fortified regions of execution -Design and implement covert channels -Unearth new avenues of attack
商品描述(中文翻譯)
雖然法醫分析已被證明是計算機安全領域中一種有價值的調查工具,但利用反法醫技術使得在高安全環境中維持隱秘的操作立足點成為可能,甚至可以持續較長時間。採取全盤揭露的方式,更新版的《Rootkit Arsenal》第二版提供了最易於理解、及時且完整的法醫對策覆蓋。本書涵蓋的主題比目前任何其他書籍都要多且深入。在此過程中,作者深入互聯網的陰暗角落,揭示了傳統上文檔記錄不全、部分記錄或故意不記錄的材料。所呈現的主題範圍包括如何:- 逃避事後分析 - 挫敗對您的指揮與控制模組的逆向工程嘗試 - 打敗即時事件響應 - 破壞記憶體分析的過程 - 修改子系統內部以向外部提供錯誤信息 - 將您的代碼鞏固在加固的執行區域 - 設計和實施隱秘通道 - 發掘新的攻擊途徑
