·Î±×ÀÎ ¤Ó ȸ¿ø°¡ÀÔ ¤Ó Àå¹Ù±¸´Ï ¤Ó °í°´¼¾ÅÍ ¤Ó ¸¶ÀÌÆäÀÌÁö ¤Ó ȸ»ç¼Ò°³
kangcom
Àüü
Home >   >   > 

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System,2nd Edition

   
ÁöÀºÀÌ Bill Blunden   |   ÃâÆÇ»ç Jones & Bartlett Publishers  |   ¹ßÇàÀÏ 2012³â 03¿ù 16ÀÏ   |   ¾ð¾î : English
 
³²Àº¼ö·® 0 ±Ç
ÆÇ¸Å°¡ 151,130¿ø ¡æ 125,440¿ø 17%
¸¶Àϸ®Áö 0% 0¿ø
¹ßÇàÀÏ 2012-03-16 | Áß·®: 1.06 kg
ISBN 144962636X |  9781449626365
±âŸÁ¤º¸ ¿ø¼­ | 784ÂÊ | $ 107.95 | Paperback
¿¹»óÀÔ°íÀÏ 7~12ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
¹è¼Ûºñ ¹«·á¹è¼Û
    Á¤°¡, ÆÇ¸Å°¡´Â Ç×°ø ¿îÀÓ·á Æ÷ÇÔ
³×Æ®¿öÅ·
Á¾ÇÕÁö¼ö 1p 202 À§
   
ÁÖÀÇ»çÇ×
  • - ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬, ǰÀý µÉ ¼ö ÀÖ½À´Ï´Ù.
  • - ÇØ¿ÜÁÖ¹®¿ø¼­´Â Ãë¼Ò ¹× ¹ÝǰÀÌ ºÒ°¡´ÉÇÕ´Ï´Ù.(´Ü, ÆÄº»À̳ª ¿À¹ß¼ÛÀº Á¦¿Ü ÀÔ´Ï´Ù.)
  • - ¼öÀÔÀýÂ÷/ÀÔ°í¼Ò¿ä±â°£ ÀÚ¼¼È÷
  •  

    Publisher Marketing
    While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It Possible To Maintain A Covert Operational Foothold For Extended Periods, Even In A High-Security Environment. Adopting An Approach That Favors Full Disclosure, The Updated Second Edition Of The Rootkit Arsenal Presents The Most Accessible, Timely, And Complete Coverage Of Forensic Countermeasures. This Book Covers More Topics, In Greater Depth, Than Any Other Currently Available. In Doing So The Author Forges Through The Murky Back Alleys Of The Internet, Shedding Light On Material That Has Traditionally Been Poorly Documented, Partially Documented, Or Intentionally Undocumented.

    The Range Of Topics Presented Includes How To:

    -Evade Post-Mortem Analysis
    -Frustrate Attempts To Reverse Engineer Your Command & Control Modules
    -Defeat Live Incident Response
    -Undermine The Process Of Memory Analysis
    -Modify Subsystem Internals To Feed Misinformation To The Outside
    -Entrench Your Code In Fortified Regions Of Execution
    -Design And Implement Covert Channels
    -Unearth New Avenues Of Attack


    Key Features

    -.Offers exhaustive background material on the Intel platform and Windows Internals
    -.Covers stratagems and tactics that have been used by botnets to harvest sensitive data
    -.Includes working proof-of-concept examples, implemented in the C programming language
    -.Heavily annotated with references to original sources
    Table of Contents
    Part I Foundation
    Chapter 1 Empty Cup Mind
    Chapter 2 Anti-Forensics Overview
    Chapter 3 Hardware Briefing
    Chapter 4 System Software Briefing
    Chapter 5 Tools of the Trade
    Chapter 6 Life in Kernel Space
    Part II Post-Mortem
    Chapter 7 Defeating Disk Analysis
    Chapter 8 Foiling Executable Analysis
    Part III Live Response
    Chapter 9 Defeating Live Response
    Chapter 10 Shellcode
    Chapter 11 Modifying Call Tables
    Chapter 12 Modifying Code
    Chapter 13 Modifying Objects Kernel
    Chapter 14 Covert Channels
    Chapter 15 Going Out-of-Band
    Part IV Summation
    Chapter 16 The Tao of Rootkits
    Contributor Bio: Blunden, Bill
    Bluden has a bachelor's degree in physics from Cornell and a master's degree in operations research. He has spent the last 10 years performing R & D on enterprise middleware, implementing distributed computing software, and working with security protocols.


    Bill Blunden

    Bill Blunden (MCSE, MCITP: Enterprise Administrator) began his journey into enterprise computing over ten years ago at an insurance company in Cleveland, Ohio. Gradually forging a westward path to Northern California, he¡¯s worked with ERP middleware, developed code for network security appliances, and taken various detours through academia. Bill is the principal investigator at Below Gotham Labs.



    µî·ÏµÈ ¼­ÆòÀÌ ¾ø½À´Ï´Ù.
     
    ÃÊ Áß °í
    ÀüüÆò±Õ(0)
    ȸ¿øÆòÁ¡   ȸ¿ø¼­Æò¼ö 0
    Bill Blunden ÀÇ ÃÖ±Ù Àú¼­
     
    Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware Industrial Complex
    22,340¿ø
    (20%¡é+1%)
     
    ·çƮŶ Rootkit
    49,000¿ø
    (2%¡é+3%)
     
    Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code
    40,310¿ø
    (28%¡é+1%)
     
    The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
    58,040¿ø
    (17%¡é+0%)
     
    Cube Farm
    18,140¿ø
    (28%¡é+0%)
     
    Jones & Bartlett Publishers ÃâÆÇ»çÀÇ ½Å°£
    Light Around the Dark
    Gee Àú
    60,370¿ø
    (17%¡é+1%)
     
    Ethics and Professionalism in Pharmacy Practice
    Lawrence E. Kennedy Àú
    120,790¿ø
    (17%¡é+1%)
     
    Cases in Health Care Management
    Sharon B. Buchbinder Àú
    81,280¿ø
    (17%¡é+1%)
     
    Effective Management of Long-Term Care Facilities
    Douglas A. Singh Àú
    116,140¿ø
    (17%¡é+1%)
     
    Managing Legal Compliance in the Health Care Industry
    George B. Moseley III Àú
    104,520¿ø
    (17%¡é+1%)
     
    À̸ÞÀÏÁÖ¼Ò¼öÁý°ÅºÎ