HSPLS site
Login
My List - 0
Help
Search
My Account
Databases
HI Newspaper
eBooks/Audiobooks
Learning
PC Reservation
Reading Program
Basic
Advanced
Power
History
Search:
Title Browse
Author Browse
Subject Browse
Best Seller Browse
Music Title Browse
Video/DVD Title Browse
Journal/Newspaper Title Browse
Serial Title Browse
Series Browse (includes Bestseller List)
General Keyword
Title Keyword
Author Keyword
Subject Keyword
Name Keyword
Series Keyword
Score Title Browse
Talking Book Title Browse
Awards Note Browse
Bib No.
Barcode
Refine Search
> You're searching:
HAWAII STATE PUBLIC LIBRARY SYSTEM
Item Information
Holdings
Summary
More Content
More by this author
Matrosov, Alex, author.
Subjects
Computer security.
Malware (Computer software)
Browse Catalog
by author:
Matrosov, Alex, author.
by title:
Rootkits and bootkit...
MARC Display
Rootkits and bootkits : reversing modern malware and next generation threats / by Alex Matsorov, Eugene Rodionov, and Sergey Bratus.
by
Matrosov, Alex, author.
San Francisco : No Starch Press, [2019]
Subjects
Computer security.
Malware (Computer software)
ISBN:
9781593277161 (pbk.) :
1593277164 (pbk.) :
Description:
xxxiii, 407 pages : illustrations ; 24 cm
Contents:
What's in a rootkit: the TDL3 case study -- Festi rootkit: the most advanced spam and DDoS bot -- Observing rootkit infections -- Evolution of the bootkit -- Operating system boot process essentials -- Boot process security -- Bootkit infection techniques -- Static analysis of a bootkit using IDA pro -- Bootkit dynamic analysis: emulation and virtualization -- An evolution of MBR and VBR infection techniques: olmasco -- IPL bootkits: rovnix and carberp -- Gapz: advanced VBR infection -- The rise of MBR ransomware -- UEFI boot vs the MBR/VBR boot process -- Contemporary UEFI bootkits -- UEFI firmware vulnerabilities -- How UEFI secure boot works -- Approaches to analyzing hidden filesystems -- BIOS/UEFI forensics: acquisition and analysis approaches.
Requests:
0
Summary:
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine's boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world's leading security experts, you'll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. Cybercrime syndicates and malicious actors will continue to write ever more persistent and covert attacks, but the game is not lost. Explore the cutting edge of malware analysis with Rootkits and Bootkits. --Back cover.
Copy/Holding information
Location
Collection
Call No.
Status
Hawaii State Library
Business, Science & Technology
005.8 Ma
Checked In
Add Copy to MyList
Horizon Information Portal 3.25_9884
© 2001-2013
SirsiDynix
All rights reserved.