000 | 02374nam a2200277 i 4500 | ||
---|---|---|---|
001 | C00087435c | ||
003 | DO-SdBDB | ||
005 | 20230317144909.0 | ||
008 | 200224s20192019espd fr 001 0 eng d | ||
020 | _a9781593277161 | ||
041 | 0 | _aeng | |
043 | _an-us-ca | ||
050 | 4 |
_aQA 76 .9 .A25 _b.M37 2019 |
|
100 | 1 | _aMatrosov, Alex. | |
245 | 0 | 0 |
_aRootkits and bootkits : _breversing modern Malware and next generation threats / _cAlex Matrosov, Eugene Rodionov, and Sergey Bratus ; foreword by Rodrigo Rubira Branco. |
260 |
_aSan Francisco, California : _bNo Starch Press, _c2019. |
||
300 |
_axxxiii, 407 páginas : _bgráficas, tablas, ilustraciones a blanco y negro. |
||
500 | _aMaterial de apoyo Departamento de Seguridad Cibernética y de la Información. | ||
505 | 1 |
_aForeword / _rby Rodrigo Rubira Branco, xix -- _tAcknowledgments, xxiii Abbreviations, xxv -- _tIntroduction, xxix -- _tPart I. Rootkits -- _tChapter 1. What's in a Rootkit: The TDL3 case study, 3 -- _tChapter 2. Festi Rootkit: The Most Advanced Spam and DDoS Bot, 13 -- _tChapter 3. Observing Rootkit Infections, 35 -- _tPart II. Bootkits -- _tChapter 4. Evolution of the Bootkit, 49 -- _tChapter 5. Operating system boot process essentials, 57 -- _tChapter 6. Boot process security, 69 -- _tChapter 7. Bootkit infection techniques, 83 -- _tChapter 8. Static analysis of a bootkit using IDA pro, 95 -- _tChapter 9. Bootkit dynamic analysis: Emulation and virtualization, 115 -- _tChapter 10. An Evolution of MBR and VBR infection techniques: Olmasco, 133 -- _tChapter 11. IPL Bootkits: Rovnix and Carberp, 147 -- _tChapter 12. Gapz: Advanced VBR infection, 177 -- _tChapter 13. The rise of MBR Ransomware, 207 -- _tChapter 14. UEFI Boot vs. the MBR/VBR boot process, 233 -- _tChapter 15. Contemporary UEFI bootkits, 255 -- _tChapter 16. UEFI firmware vulnerabilities, 285 -- _tPart III. Defense and forensic techniques -- _tChapter 17. How UEFI secure boot works, 319 -- _tChapter 18. Approaches to analyzing hidden filesystems, 351 -- _tChapter 19. BIOS/UEFI forensics: Firmware acquisition and analysis approaches, 363 -- _tIndex, 391. |
|
650 | _aSeguridad en computadores. | ||
650 | _aRedes informáticas. | ||
650 | _aRootkits (Programas para computador) | ||
650 | _aSeguridad en computadores. | ||
650 | _aMalware (Programas para computador) | ||
942 | _cCG | ||
999 |
_c126448 _d126448 |