Acheter d'occasion
EUR 28,11
+ EUR 2,99 (livraison en France métropolitaine)
D'occasion: Très bon | Détails
Vendu par tousbouquins
État: D'occasion: Très bon
Commentaire: Très bon état; Expédié par avion depuis les USA; prévoir une livraison entre 10 à 15 jours ouvrables. Satisfait ou remboursé
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Professional Rootkits (Anglais) Broché – 9 mars 2007

Rentrée scolaire et universitaire : livres, agendas, fournitures, ordinateurs, ameublement …découvrez notre boutique

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Broché
"Veuillez réessayer"
EUR 35,82 EUR 28,11

rentrée scolaire 2017 rentrée scolaire 2017

click to open popover

Offres spéciales et liens associés


Description du produit

Présentation de l'éditeur

Whether you want to learn how to develop a robust, full–featured rootkit or you′re looking for effective ways to prevent one from being installed on your network, this hands–on resource provides you with the tools you′ll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution.

This book provides the detailed, step–by–step instructions and examples required to produce full–featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided.

What you will learn from this book

  • Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more
  • Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits
  • Techniques for protecting your system by detecting a rootkit before it′s installed
  • Ways to create modular, commercial grade software

Who this book is for

This book is for anyone who is involved in software development or computer security.

Wrox Professional guides are planned and written by working programmers to meet the real–world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.

Quatrième de couverture

Whether you want to learn how to develop a robust, full–featured rootkit or you′re looking for effective ways to prevent one from being installed on your network, this hands–on resource provides you with the tools you′ll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution.

This book provides the detailed, step–by–step instructions and examples required to produce full–featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided.

What you will learn from this book

  • Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more
  • Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits

  • Techniques for protecting your system by detecting a rootkit before it′s installed

  • Ways to create modular, commercial grade software

Who this book is for

This book is for anyone who is involved in software development or computer security.

Wrox Professional guides are planned and written by working programmers to meet the real–world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.



Détails sur le produit


Commentaires client

Il n'y a pour l'instant aucun commentaire client.
5 étoiles
0
4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoile
0
Partagez votre opinion avec les autres clients
Vous souhaitez découvrir plus de produits ? Consultez cette page pour voir plus : etagere de rangement enfant

Où en sont vos commandes ?

Livraison et retours

Besoin d'aide ?