Rootkits: Subverting the Windows Kernel
Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James...
Introducing Regular Expressions
This book shows you how to write regular expressions through examples. Its goal is to
make learning regular expressions as easy as possible. In fact, this book demonstrates
nearly every concept it presents by way of example so you can easily imitate and try
OpenStack Cloud Security
Build a secure OpenStack cloud to withstand all common attacks
About This Book
Design, implement, and deliver a safe and sound OpenStack cluster using best practices
Create a production-ready environment and protect your data on the cloud
A step-by-step tutorial packed with...