Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

Buy

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.

The range of topics presented includes how to:
-Evade post-mortem analysis
-Frustrate attempts to reverse engineer your command & control modules
-Defeat live incident response
-Undermine the process of memory analysis
-Modify subsystem internals to feed misinformation to the outside
-Entrench your code in fortified regions of execution
-Design and implement covert channels
-Unearth new avenues of attack

(HTML tags aren't allowed.)

mod_perl Developer's Cookbook (Developer's Library)
mod_perl Developer's Cookbook (Developer's Library)
mod_perl is a unique piece of software that wholly integrates the power of Perl with the flexibility and stability of the Apache Web server. With mod_perl, developers can harness the power of the full Apache API and develop Web applications quickly and without sacrificing performance.

The mod_perl Developer's Cookbook teaches
...
Microsoft SQL Server 2012 Analysis Services: The BISM Tabular Model
Microsoft SQL Server 2012 Analysis Services: The BISM Tabular Model

When we, the authors of this book, first learned what Microsoft’s plans were for Analysis Services in the SQL Server 2012 release, we were not happy. Analysis Services hadn’t acquired much in the way of new features since 2005, even though in the meantime it had grown to become the biggest-selling OLAP tool. It seemed as...

Cyber Crime Investigator's Field Guide, Second Edition
Cyber Crime Investigator's Field Guide, Second Edition
In the past 30 years, growth in the area of data communications has been phenomenal, to say the least. During the Vietnam War, one of my duty stations was on an island in the China Sea. I was part of a signal intelligence group, intercepting and decoding wartime communications traffic. We did our best to decode and analyze the information we...

Pharmaceutical Process Scale-Up, Second Edition (Drugs and the Pharmaceutical Sciences)
Pharmaceutical Process Scale-Up, Second Edition (Drugs and the Pharmaceutical Sciences)
Scale-up is generally defined as the process of increasing batch size. Scale-up of a process can also be viewed as a procedure for applying the same process to different output volumes. There is a subtle difference between these two definitions: batch size enlargement does not always translate into a size increase of the...
Office 365: Migrating and Managing Your Business in the Cloud
Office 365: Migrating and Managing Your Business in the Cloud

Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical...

Murach's C++ 2008 (Murach: Training & Reference)
Murach's C++ 2008 (Murach: Training & Reference)

Finally, a great training and reference book for Visual C++ by Dr. Prentiss Knowlton, an instructor of C++ since its inception. This book helps you master C++ 2008 quickly and easily by using all the time- and work-saving features of Visual Studio. That's true whether you're a:

  • Java developer who wants to learn...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy