While Forensic Analysis Has Proven To Be A Valuable Investigative
Tool In The Field Of Computer Security, Utilizing Anti-Forensic
Technology Makes It Possible To Maintain A Covert Operational
Foothold For Extended Periods, Even In A High-Security Environment.
Adopting An Approach That Favors Full Disclosure, The Updated
Second Edition Of The Rootkit Arsenal Presents The Most Accessible,
Timely, And Complete Coverage Of Forensic Countermeasures. This
Book Covers More Topics, In Greater Depth, Than Any Other Currently
Available. In Doing So The Author Forges Through The Murky Back
Alleys Of The Internet, Shedding Light On Material That Has
Traditionally Been Poorly Documented, Partially Documented, Or
Intentionally Undocumented. The Range Of Topics Presented Includes
How To: -Evade Post-Mortem Analysis -Frustrate Attempts To Reverse
Engineer Your Command & Control Modules -Defeat Live Incident
Response -Undermine The Process Of Memory Analysis -Modify
Subsystem Internals To Feed Misinformation To The Outside -Entrench
Your Code In Fortified Regions Of Execution -Design And Implement
Covert Channels -Unearth New Avenues Of Attack
General
Imprint: |
Jones And Bartlett Publishers, Inc
|
Country of origin: |
United States |
Release date: |
March 2012 |
First published: |
2013 |
Authors: |
Bill Blunden
|
Dimensions: |
230 x 154 x 43mm (L x W x T) |
Format: |
Paperback
|
Pages: |
784 |
Edition: |
2nd Revised edition |
ISBN-13: |
978-1-4496-2636-5 |
Categories: |
Books
Promotions
|
LSN: |
1-4496-2636-X |
Barcode: |
9781449626365 |
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!