Table of Contents for
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition
Close
Version ebook
/
Retour
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition
by Aaron LeMasters
Published by McGraw-Hill, 2016
Cover
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
Title Page
Copyright Page
Dedication
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
Contents
Foreword
Acknowledgments
Introduction
Part I Malware
1 Malware Propagation
2 Malware Functionality
Part II Rootkits
3 User-Mode Rootkits
4 Kernel-Mode Rootkits
5 Virtual Rootkits
6 The Future of Rootkits
Part III Prevention Technologies
7 Antivirus
8 Host Protection Systems
9 Host-Based Intrusion Prevention
10 Rootkit Detection
11 General Security Practices
Appendix System Integrity Analysis: Building Your Own Rootkit Detector
Index
Prev
Previous Chapter
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
Next
Next Chapter
Copyright Page
Prev
Previous Chapter
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Davis
Next
Next Chapter
Copyright Page