Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

Buy

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.

The range of topics presented includes how to:
-Evade post-mortem analysis
-Frustrate attempts to reverse engineer your command & control modules
-Defeat live incident response
-Undermine the process of memory analysis
-Modify subsystem internals to feed misinformation to the outside
-Entrench your code in fortified regions of execution
-Design and implement covert channels
-Unearth new avenues of attack

(HTML tags aren't allowed.)

Distributed Algorithms: An Intuitive Approach (The MIT Press)
Distributed Algorithms: An Intuitive Approach (The MIT Press)

A comprehensive guide to distributed algorithms that emphasizes examples and exercises rather than mathematical argumentation.

This book offers students and researchers a guide to distributed algorithms that emphasizes examples and exercises rather than the intricacies of mathematical models. It avoids mathematical...

Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)
Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)

Use This Information To Avoid Being Spied By The Government Today!

If you’ve ever heard outrageous stories about online illegal drug stores, hit men for hire, celebrities busted for child porn, mad scientific experiments, and Illuminati rituals, you’ve probably heard of the “dark web”, alternatively called...

Programming Multicore and Many-core Computing Systems (Wiley Series on Parallel and Distributed Computing)
Programming Multicore and Many-core Computing Systems (Wiley Series on Parallel and Distributed Computing)

Programming multi-core and many-core computing systems

Sabri Pllana, Linnaeus University, Sweden

Fatos Xhafa, Technical University of Catalonia, Spain

Provides state-of-the-art methods for programming multi-core and many-core systems

The book comprises a selection of twenty two...


Good Habits for Great Coding: Improving Programming Skills with Examples in Python
Good Habits for Great Coding: Improving Programming Skills with Examples in Python

Improve your coding skills and learn how to write readable code. Rather than teach basic programming, this book presumes that readers understand the fundamentals, and offers time-honed best practices for style, design, documenting, testing, refactoring, and more. 

Taking an informal, conversational tone,...

WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy