Table of Contents for
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition by Aaron LeMasters Published by McGraw-Hill, 2016
  1. Cover
  2. Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
  7. Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
  8. Contents
  9. Foreword
  10. Acknowledgments
  11. Introduction
  12. Part I Malware
  13. 1 Malware Propagation
  14. 2 Malware Functionality
  15. Part II Rootkits
  16. 3 User-Mode Rootkits
  17. 4 Kernel-Mode Rootkits
  18. 5 Virtual Rootkits
  19. 6 The Future of Rootkits
  20. Part III Prevention Technologies
  21. 7 Antivirus
  22. 8 Host Protection Systems
  23. 9 Host-Based Intrusion Prevention
  24. 10 Rootkit Detection
  25. 11 General Security Practices
  26. Appendix System Integrity Analysis: Building Your Own Rootkit Detector
  27. Index
Prev Previous Chapter
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
Next Next Chapter
Contents

At a Glance

Part I   Malware

1   Malware Propagation

2   Malware Functionality

Part II   Rootkits

 3   User-Mode Rootkits

 4   Kernel-Mode Rootkits

 5   Virtual Rootkits

 6   The Future of Rootkits

Part III   Prevention Technologies

   7   Antivirus

   8   Host Protection Systems

   9   Host-Based Intrusion Prevention

   10   Rootkit Detection

   11   General Security Practices

   Appendix   System Integrity Analysis: Building Your Own Rootkit Detector

Index

Prev Previous Chapter
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
Next Next Chapter
Contents
Back to top