|
|
|
 |
ÆÇ¸Å°¡ |
125,900¿ø ¡æ 115,800¿ø 8% |
|
 |
¸¶Àϸ®Áö |
0% 0¿ø |
|
 |
¹ßÇàÀÏ |
2012-03-16 | Áß·®: 1.06 kg
|
 |
ISBN |
144962636X | 9781449626365
|
 |
±âŸÁ¤º¸ |
¿ø¼ | 784ÂÊ
| $ 107.95
| Paperback
|
|
 |
¿¹»óÃâ°íÀÏ
|
7~12ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ) |
 |
¹è¼Ûºñ |
¹«·á¹è¼Û
|
|
|
Á¤°¡, ÆÇ¸Å°¡´Â Ç×°ø ¿îÀÓ·á Æ÷ÇÔ |
|
|
|
 |
³×Æ®¿öÅ·
|
|
|
|
|
|
¡Ø NAVER Pay·Î ±¸¸Å½Ã Á¦ÁÖÁö¿ªÀº 5¸¸¿ø ¹Ì¸¸ °áÀçÀÇ °æ¿ì ¹è¼Ûºñ°¡ Ãß°¡ µÉ ¼ö ÀÖ½À´Ï´Ù.
|
|
 |
µµ¼Àç°í |
¹Ì±¹ ½Ç½Ã°£ ÇöÁöÀç°í - Indiana : 0 ±Ç, Tennessee : 52 ±Ç
|
|
 |
ÁÖÀÇ»çÇ× |
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬, ǰÀý µÉ ¼ö ÀÖ½À´Ï´Ù. ÇØ¿ÜÁÖ¹®¿ø¼´Â Ãë¼Ò ¹× ¹ÝǰÀÌ ºÒ°¡´ÉÇÕ´Ï´Ù. (´Ü, ÆÄº»À̳ª ¿À¹ß¼ÛÀº Á¦¿Ü ÀÔ´Ï´Ù.) ¼öÀÔÀýÂ÷/ÀÔ°í¼Ò¿ä±â°£ ÀÚ¼¼È÷ |
|
|
 |
|
Publisher Marketing While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It Possible To Maintain A Covert Operational Foothold For Extended Periods, Even In A High-Security Environment. Adopting An Approach That Favors Full Disclosure, The Updated Second Edition Of The Rootkit Arsenal Presents The Most Accessible, Timely, And Complete Coverage Of Forensic Countermeasures. This Book Covers More Topics, In Greater Depth, Than Any Other Currently Available. In Doing So The Author Forges Through The Murky Back Alleys Of The Internet, Shedding Light On Material That Has Traditionally Been Poorly Documented, Partially Documented, Or Intentionally Undocumented.
The Range Of Topics Presented Includes How To: -Evade Post-Mortem Analysis -Frustrate Attempts To Reverse Engineer Your Command & Control Modules -Defeat Live Incident Response -Undermine The Process Of Memory Analysis -Modify Subsystem Internals To Feed Misinformation To The Outside -Entrench Your Code In Fortified Regions Of Execution -Design And Implement Covert Channels -Unearth New Avenues Of Attack
Key Features
-.Offers exhaustive background material on the Intel platform and Windows Internals -.Covers stratagems and tactics that have been used by botnets to harvest sensitive data -.Includes working proof-of-concept examples, implemented in the C programming language -.Heavily annotated with references to original sources
|
 |
|
 |
Table of Contents Part I Foundation Chapter 1 Empty Cup Mind Chapter 2 Anti-Forensics Overview Chapter 3 Hardware Briefing Chapter 4 System Software Briefing Chapter 5 Tools of the Trade Chapter 6 Life in Kernel Space Part II Post-Mortem Chapter 7 Defeating Disk Analysis Chapter 8 Foiling Executable Analysis Part III Live Response Chapter 9 Defeating Live Response Chapter 10 Shellcode Chapter 11 Modifying Call Tables Chapter 12 Modifying Code Chapter 13 Modifying Objects Kernel Chapter 14 Covert Channels Chapter 15 Going Out-of-Band Part IV Summation Chapter 16 The Tao of Rootkits
|
 |
|
 |
Contributor Bio: Blunden, Bill Bluden has a bachelor's degree in physics from Cornell and a master's degree in operations research. He has spent the last 10 years performing R & D on enterprise middleware, implementing distributed computing software, and working with security protocols.
Bill Blunden
Bill Blunden (MCSE, MCITP: Enterprise Administrator) began his journey into enterprise computing over ten years ago at an insurance company in Cleveland, Ohio. Gradually forging a westward path to Northern California, he¡¯s worked with ERP middleware, developed code for network security appliances, and taken various detours through academia. Bill is the principal investigator at Below Gotham Labs.
|
 |
|
|
|
|
|
|
|
|
|
|