资源描述:
《hoglund, g. & butler j. rootkits subverting the windows kernel外语英文电子书外语英文电子书》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、ABCAmberCHMConverterTrialversion,http://www.processtext.com/abcchm.htmlRootkits:SubvertingtheWindowsKernelByGregHoglund,JamesButler...............................................Publisher:AddisonWesleyProfessionalPubDate:July22,2005ISBN:0-321-29431-9Pages:352TableofCon
2、tents
3、IndexPage1ABCAmberCHMConverterTrialversion,http://www.processtext.com/abcchm.html"It'simperativethateverybodyworkinginthefieldofcyber-securityreadthisbooktounderstandthegrowingthreatofrootkits."Magazine"Thismaterialisnotonlyup-to-date,itdefinesup-to-date.Itistrulycutting-e
4、dge.Astheonlybookonthesubject,Rootkitsprogrammer.It'sdetailed,wellresearchedandthetechnicalinformationisexcellent.Theleveloftechnicaldetail,research,andtimeinvestedindevelopingrelevantexamplesisimpressive.Inoneword:Outstanding."--TonyBautts,SecurityConsultant;CEO,Xtivix,Inc."Thi
5、sbookisanessentialreadforanyoneresponsibleforWindowssecurity.Securityprofessionals,Windowssystemadministrators,andprogrammersingeneralwillwanttounderstandthetechniquesusedbyrootkitauthors.AtatimewhenmanyITandsecurityprofessionalsarestillworryingaboutthelateste-mailvirusorhowtoge
6、tallofthismonth'ssecuritypatchesinstalled,Mr.HoglundandMr.ButleropenyoureyestosomeofthemoststealthyandsignificantthreatstotheWindowsoperatingsystem.Onlybyunderstandingtheseoffensivetechniquescanyouproperlydefendthenetworksandsystemsforwhichyouareresponsible."--JenniferKolde,Secu
7、rityConsultant,Author,andInstructor"What'sworsethanbeingowned?Notknowingit.FindoutwhatitmeanstobeownedbyreadingHoglundandButler'sfirst-of-a-kindbookonrootkits.Attheapexthemalicioushackertoolset--whichincludesdecompilers,disassemblers,fault-injectionengines,kerneldebuggers,payloa
8、dcollections,coveragetools,andflowanalysistools--istherootkit.BeginningwhereExploitingSoftwareleftoff,thisbookshowshowattackershideinplainsight."Rootkitsareextremelypowerfulandarethenextwaveofattacktechnology.Likeothertypesofmaliciouscode,rootkitsthriveonstealthiness.Theyhideawa
9、yfromstandardsystemobservers,employinghooks,tra