Related Books
Language: en
Pages: 354
Pages: 354
Type: BOOK - Published: 2006 - Publisher: Addison-Wesley Professional
"Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern opera
Language: en
Pages: 434
Pages: 434
Type: BOOK - Published: 2006-12-11 - Publisher: John Wiley & Sons
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operatin
Language: en
Pages: 449
Pages: 449
Type: BOOK - Published: 2019-05-07 - Publisher: No Starch Press
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. W
Language: en
Pages: 385
Pages: 385
Type: BOOK - Published: 2012-09-05 - Publisher: McGraw Hill Professional
Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive
Language: en
Pages: 164
Pages: 164
Type: BOOK - Published: 2007-04-01 - Publisher: No Starch Press
Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offe