HSPLS site
HSPLS site
 Search 
 My Account 
 Databases 
 HI Newspaper 
 eBooks/Audiobooks 
 Learning 
 PC Reservation 
 Reading Program 
   
BasicAdvancedPowerHistory
Search:    Refine Search  
> You're searching: HAWAII STATE PUBLIC LIBRARY SYSTEM
 
Item Information
 HoldingsHoldings
  Summary
  More Content
 
 
 More by this author
 
  •  
  • Matrosov, Alex, author.
     
     Subjects
     
  •  
  • Computer security.
     
  •  
  • Malware (Computer software)
     
     Browse Catalog
      by author:
     
  •  
  •  Matrosov, Alex, author.
     
      by title:
     
  •  
  •  Rootkits and bootkit...
     
     
     
     MARC Display
    Rootkits and bootkits : reversing modern malware and next generation threats / by Alex Matsorov, Eugene Rodionov, and Sergey Bratus.
    by Matrosov, Alex, author.
    View full image
    San Francisco : No Starch Press, [2019]
    Subjects
  • Computer security.
  •  
  • Malware (Computer software)
  • ISBN: 
    9781593277161 (pbk.) :
    1593277164 (pbk.) :
    Description: 
    xxxiii, 407 pages : illustrations ; 24 cm
    Contents: 
    What's in a rootkit: the TDL3 case study -- Festi rootkit: the most advanced spam and DDoS bot -- Observing rootkit infections -- Evolution of the bootkit -- Operating system boot process essentials -- Boot process security -- Bootkit infection techniques -- Static analysis of a bootkit using IDA pro -- Bootkit dynamic analysis: emulation and virtualization -- An evolution of MBR and VBR infection techniques: olmasco -- IPL bootkits: rovnix and carberp -- Gapz: advanced VBR infection -- The rise of MBR ransomware -- UEFI boot vs the MBR/VBR boot process -- Contemporary UEFI bootkits -- UEFI firmware vulnerabilities -- How UEFI secure boot works -- Approaches to analyzing hidden filesystems -- BIOS/UEFI forensics: acquisition and analysis approaches.
    Requests: 
    0
    Summary: 
    Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine's boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world's leading security experts, you'll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. Cybercrime syndicates and malicious actors will continue to write ever more persistent and covert attacks, but the game is not lost. Explore the cutting edge of malware analysis with Rootkits and Bootkits. --Back cover.
    Add to my list 
    Copy/Holding information
    LocationCollectionCall No.Status 
    Hawaii State LibraryBusiness, Science & Technology005.8 MaChecked InAdd Copy to MyList


    Horizon Information Portal 3.25_9884
     Powered by Dynix
    © 2001-2013 SirsiDynix All rights reserved.
    Horizon Information Portal