·Î±×ÀÎ ¤Ó ȸ¿ø°¡ÀÔ ¤Ó Àå¹Ù±¸´Ï ¤Ó °í°´¼¾ÅÍ ¤Ó ¸¶ÀÌÆäÀÌÁö ¤Ó ȸ»ç¼Ò°³
kangcom
Àüü
Home >   >   > 

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System,2nd Edition

   
ÁöÀºÀÌ Bill Blunden   |   ÃâÆÇ»ç Jones & Bartlett Publishers  |   ¹ßÇàÀÏ 2012³â 03¿ù 16ÀÏ   |   ¾ð¾î : English
 
³²Àº¼ö·® 0 ±Ç
Ŭ¸¯ÇϽøé Å« µµ¼­À̹ÌÁö¸¦ º¸½Ç ¼ö ÀÖ½À´Ï´Ù.
ÆÇ¸Å°¡ 125,900¿ø ¡æ 115,800¿ø 8%
¸¶Àϸ®Áö 0% 0¿ø
¹ßÇàÀÏ 2012-03-16 | Áß·®: 1.06 kg
ISBN 144962636X | 9781449626365
±âŸÁ¤º¸ ¿ø¼­ | 784ÂÊ | $ 107.95 | Paperback
¿¹»óÃâ°íÀÏ 7~12ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
¹è¼Ûºñ ¹«·á¹è¼Û
    Á¤°¡, ÆÇ¸Å°¡´Â Ç×°ø ¿îÀÓ·á Æ÷ÇÔ
³×Æ®¿öÅ·
Á¾ÇÕÁö¼ö 1p 202 À§
   
µµ¼­Àç°í ¹Ì±¹ ½Ç½Ã°£ ÇöÁöÀç°í - Indiana : 0 ±Ç, Tennessee : 52 ±Ç
ÁÖÀÇ»çÇ× ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬, ǰÀý µÉ ¼ö ÀÖ½À´Ï´Ù.
ÇØ¿ÜÁÖ¹®¿ø¼­´Â Ãë¼Ò ¹× ¹ÝǰÀÌ ºÒ°¡´ÉÇÕ´Ï´Ù. (´Ü, ÆÄº»À̳ª ¿À¹ß¼ÛÀº Á¦¿Ü ÀÔ´Ï´Ù.)
¼öÀÔÀýÂ÷/ÀÔ°í¼Ò¿ä±â°£ ÀÚ¼¼È÷
 

Publisher Marketing
While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It Possible To Maintain A Covert Operational Foothold For Extended Periods, Even In A High-Security Environment. Adopting An Approach That Favors Full Disclosure, The Updated Second Edition Of The Rootkit Arsenal Presents The Most Accessible, Timely, And Complete Coverage Of Forensic Countermeasures. This Book Covers More Topics, In Greater Depth, Than Any Other Currently Available. In Doing So The Author Forges Through The Murky Back Alleys Of The Internet, Shedding Light On Material That Has Traditionally Been Poorly Documented, Partially Documented, Or Intentionally Undocumented.

The Range Of Topics Presented Includes How To:

-Evade Post-Mortem Analysis
-Frustrate Attempts To Reverse Engineer Your Command & Control Modules
-Defeat Live Incident Response
-Undermine The Process Of Memory Analysis
-Modify Subsystem Internals To Feed Misinformation To The Outside
-Entrench Your Code In Fortified Regions Of Execution
-Design And Implement Covert Channels
-Unearth New Avenues Of Attack


Key Features

-.Offers exhaustive background material on the Intel platform and Windows Internals
-.Covers stratagems and tactics that have been used by botnets to harvest sensitive data
-.Includes working proof-of-concept examples, implemented in the C programming language
-.Heavily annotated with references to original sources
Table of Contents
Part I Foundation
Chapter 1 Empty Cup Mind
Chapter 2 Anti-Forensics Overview
Chapter 3 Hardware Briefing
Chapter 4 System Software Briefing
Chapter 5 Tools of the Trade
Chapter 6 Life in Kernel Space
Part II Post-Mortem
Chapter 7 Defeating Disk Analysis
Chapter 8 Foiling Executable Analysis
Part III Live Response
Chapter 9 Defeating Live Response
Chapter 10 Shellcode
Chapter 11 Modifying Call Tables
Chapter 12 Modifying Code
Chapter 13 Modifying Objects Kernel
Chapter 14 Covert Channels
Chapter 15 Going Out-of-Band
Part IV Summation
Chapter 16 The Tao of Rootkits
Contributor Bio: Blunden, Bill
Bluden has a bachelor's degree in physics from Cornell and a master's degree in operations research. He has spent the last 10 years performing R & D on enterprise middleware, implementing distributed computing software, and working with security protocols.


Bill Blunden

Bill Blunden (MCSE, MCITP: Enterprise Administrator) began his journey into enterprise computing over ten years ago at an insurance company in Cleveland, Ohio. Gradually forging a westward path to Northern California, he¡¯s worked with ERP middleware, developed code for network security appliances, and taken various detours through academia. Bill is the principal investigator at Below Gotham Labs.



µî·ÏµÈ ¼­ÆòÀÌ ¾ø½À´Ï´Ù.
 
ÃÊ Áß °í
ÀüüÆò±Õ(0)
ȸ¿øÆòÁ¡   ȸ¿ø¼­Æò¼ö 0
Bill Blunden ÀÇ ÃÖ±Ù Àú¼­
 
Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware Industrial Complex
22,300¿ø
(20%¡é+1%)
 
·çƮŶ Rootkit
49,000¿ø
(2%¡é+3%)
 
Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code
41,000¿ø
(23%¡é+1%)
 
Cube Farm
18,900¿ø
(25%¡é+0%)
 
Offshoring It: The Good, the Bad, and the Ugly
21,600¿ø
(23%¡é+0%)
 
Jones & Bartlett Publishers ÃâÆÇ»çÀÇ ½Å°£
Light Around the Dark
Gee Àú
68,300¿ø
(10%¡é+1%)
 
Delivery of Health Care and America with Nav 2 Adv/Premier Access & Nav 2 Scenario for Health Care Delivery
Leiyu Shi Àú
180,500¿ø
(14%¡é+1%)
 
Fundamentals of Medium/Heavy Duty Commercial Vehicle Systems
Gus Wright Àú
158,800¿ø
(14%¡é+1%)
 
Foundations of Education: An EMS Approach
National Association of Ems Educators (N Àú
86,600¿ø
(14%¡é+1%)
 
Bu- Pac: Phtls 9e W/Opeb/ Phtls 9e Hybrid Mods
National Association of Emergency Medica Àú
115,500¿ø
(14%¡é+1%)
 
À̸ÞÀÏÁÖ¼Ò¼öÁý°ÅºÎ