Related Books
Language: en
Pages: 816
Pages: 816
Type: BOOK - Published: 2013 - Publisher: Jones & Bartlett Publishers
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible t
Language: en
Pages: 937
Pages: 937
Type: BOOK - Published: 2009-05-04 - Publisher: Jones & Bartlett Publishers
With the growing prevalence of the Internet, rootkit technology has taken center stage in the battle between White Hats and Black Hats. Adopting an approach tha
Language: en
Pages: 938
Pages: 938
Type: BOOK - Published: 2009-06-23 - Publisher: Jones & Bartlett Learning
A guide to rootkit technology covers such topics as using kernal debugger, modifying privilege levels on Windows Vista, establishing covert network channels, an
Language: en
Pages: 938
Pages: 938
Type: BOOK - Published: 2009-06-23 - Publisher: Jones & Bartlett Publishers
With the growing prevalence of the Internet, rootkit technology has taken center stage in the battle between White Hats and Black Hats. Adopting an approach tha
Language: en
Pages: 449
Pages: 449
Type: BOOK - Published: 2019-05-07 - Publisher: No Starch Press
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. W