Banner BCRD
Imagen de portada de Amazon
Imagen de Amazon.com
Imagen de Google Jackets

Rootkits and bootkits : reversing modern Malware and next generation threats / Alex Matrosov, Eugene Rodionov, and Sergey Bratus ; foreword by Rodrigo Rubira Branco.

Por: Tipo de material: TextoTextoIdioma: Inglés Detalles de publicación: San Francisco, California : No Starch Press, 2019.Descripción: xxxiii, 407 páginas : gráficas, tablas, ilustraciones a blanco y negroISBN:
  • 9781593277161
Tema(s): Clasificación LoC:
  • QA 76 .9 .A25  .M37 2019
Contenidos incompletos:
Foreword / by Rodrigo Rubira Branco, xix -- Acknowledgments, xxiii Abbreviations, xxv -- Introduction, xxix -- Part I. Rootkits -- Chapter 1. What's in a Rootkit: The TDL3 case study, 3 -- Chapter 2. Festi Rootkit: The Most Advanced Spam and DDoS Bot, 13 -- Chapter 3. Observing Rootkit Infections, 35 -- Part II. Bootkits -- Chapter 4. Evolution of the Bootkit, 49 -- Chapter 5. Operating system boot process essentials, 57 -- Chapter 6. Boot process security, 69 -- Chapter 7. Bootkit infection techniques, 83 -- Chapter 8. Static analysis of a bootkit using IDA pro, 95 -- Chapter 9. Bootkit dynamic analysis: Emulation and virtualization, 115 -- Chapter 10. An Evolution of MBR and VBR infection techniques: Olmasco, 133 -- Chapter 11. IPL Bootkits: Rovnix and Carberp, 147 -- Chapter 12. Gapz: Advanced VBR infection, 177 -- Chapter 13. The rise of MBR Ransomware, 207 -- Chapter 14. UEFI Boot vs. the MBR/VBR boot process, 233 -- Chapter 15. Contemporary UEFI bootkits, 255 -- Chapter 16. UEFI firmware vulnerabilities, 285 -- Part III. Defense and forensic techniques -- Chapter 17. How UEFI secure boot works, 319 -- Chapter 18. Approaches to analyzing hidden filesystems, 351 -- Chapter 19. BIOS/UEFI forensics: Firmware acquisition and analysis approaches, 363 -- Index, 391.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)

Material de apoyo Departamento de Seguridad Cibernética y de la Información.

Foreword / by Rodrigo Rubira Branco, xix -- Acknowledgments, xxiii Abbreviations, xxv -- Introduction, xxix -- Part I. Rootkits -- Chapter 1. What's in a Rootkit: The TDL3 case study, 3 -- Chapter 2. Festi Rootkit: The Most Advanced Spam and DDoS Bot, 13 -- Chapter 3. Observing Rootkit Infections, 35 -- Part II. Bootkits -- Chapter 4. Evolution of the Bootkit, 49 -- Chapter 5. Operating system boot process essentials, 57 -- Chapter 6. Boot process security, 69 -- Chapter 7. Bootkit infection techniques, 83 -- Chapter 8. Static analysis of a bootkit using IDA pro, 95 -- Chapter 9. Bootkit dynamic analysis: Emulation and virtualization, 115 -- Chapter 10. An Evolution of MBR and VBR infection techniques: Olmasco, 133 -- Chapter 11. IPL Bootkits: Rovnix and Carberp, 147 -- Chapter 12. Gapz: Advanced VBR infection, 177 -- Chapter 13. The rise of MBR Ransomware, 207 -- Chapter 14. UEFI Boot vs. the MBR/VBR boot process, 233 -- Chapter 15. Contemporary UEFI bootkits, 255 -- Chapter 16. UEFI firmware vulnerabilities, 285 -- Part III. Defense and forensic techniques -- Chapter 17. How UEFI secure boot works, 319 -- Chapter 18. Approaches to analyzing hidden filesystems, 351 -- Chapter 19. BIOS/UEFI forensics: Firmware acquisition and analysis approaches, 363 -- Index, 391.

No hay comentarios en este titulo.

para colocar un comentario.

Banco Central de la República Dominicana
Av. Pedro Henríquez Ureña, esq. Av. Leopoldo Navarro. Antigua sede, tercer piso
Apartado postal, 1347 | Santo Domingo de Guzmán, D. N., República Dominicana |
Teléfono: 809-221-9111 Exts.: 3653 y 3654|
Horario de servicios: L/V. 9:00 a. m. – 5:00 p. m.

Con tecnología Koha