Table of Contents for
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition by Aaron LeMasters Published by McGraw-Hill, 2016
  1. Cover
  2. Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
  7. Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
  8. Contents
  9. Foreword
  10. Acknowledgments
  11. Introduction
  12. Part I Malware
  13. 1 Malware Propagation
  14. 2 Malware Functionality
  15. Part II Rootkits
  16. 3 User-Mode Rootkits
  17. 4 Kernel-Mode Rootkits
  18. 5 Virtual Rootkits
  19. 6 The Future of Rootkits
  20. Part III Prevention Technologies
  21. 7 Antivirus
  22. 8 Host Protection Systems
  23. 9 Host-Based Intrusion Prevention
  24. 10 Rootkit Detection
  25. 11 General Security Practices
  26. Appendix System Integrity Analysis: Building Your Own Rootkit Detector
  27. Index
Next Next Chapter
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
Next Next Chapter
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
Back to top