Version ebook / Retour
Part I Malware
1 Malware Propagation
2 Malware Functionality
Part II Rootkits
3 User-Mode Rootkits
4 Kernel-Mode Rootkits
5 Virtual Rootkits
6 The Future of Rootkits
Part III Prevention Technologies
7 Antivirus
8 Host Protection Systems
9 Host-Based Intrusion Prevention
10 Rootkit Detection
11 General Security Practices
Appendix System Integrity Analysis: Building Your Own Rootkit Detector
Index