0
Your cart

Your cart is empty

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Buy Now

Managed Code Rootkits - Hooking into Runtime Environments (Paperback) Loot Price: R922
Discovery Miles 9 220
You Save: R138 (13%)
Managed Code Rootkits - Hooking into Runtime Environments (Paperback): Erez Metula

Managed Code Rootkits - Hooking into Runtime Environments (Paperback)

Erez Metula

 (sign in to rate)
List price R1,060 Loot Price R922 Discovery Miles 9 220 | Repayment Terms: R86 pm x 12* You Save R138 (13%)

Bookmark and Share

Expected to ship within 12 - 19 working days

Imagine being able to change the languages for the applicationsthat a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks.Erez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed codethat a computeris running, whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker, and countermeasures are covered, makingthis book a one stop shop for this new attack vector.
Named a 2011 Best Hacking and Pen Testing Book by "InfoSec Reviews"Introduces the reader briefly to managed code environments and rootkits in generalCompletely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementationFocuses on managed code including Java, .NET, Android Dalvik and reviews malware development scanarios"

General

Imprint: Syngress Media,U.S.
Country of origin: United States
Release date: November 2010
First published: November 2010
Authors: Erez Metula
Dimensions: 235 x 191 x 22mm (L x W x T)
Format: Paperback
Pages: 336
ISBN-13: 978-1-59749-574-5
Categories: Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Promotions
LSN: 1-59749-574-3
Barcode: 9781597495745

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Handbook of Computer Crime Investigation…
Eoghan Casey Paperback R1,659 Discovery Miles 16 590
At Any Cost - The South African…
Stephen Timm Paperback R385 R361 Discovery Miles 3 610
An Introduction to Hacking and Crimeware…
Victoria Loewengart Paperback R500 Discovery Miles 5 000
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R564 R524 Discovery Miles 5 240
Masters of Deception: the Gang That…
Michele Slatalla Paperback R480 R444 Discovery Miles 4 440
Hacking
Walter Spivak Hardcover R939 Discovery Miles 9 390
The Pentester BluePrint - Starting a…
PL Wylie Paperback R690 R636 Discovery Miles 6 360
Advanced Persistent Threat…
Eric Cole Paperback R1,176 Discovery Miles 11 760
The Hacker's Guide to OS X - Exploiting…
Robert Bathurst, Russ Rogers, … Paperback R1,038 R803 Discovery Miles 8 030
Introduction to Cybercrime - Computer…
Joshua B. Hill, Nancy E. Marion Hardcover R2,523 Discovery Miles 25 230
Seven Deadliest Web Application Attacks
Mike Shema Paperback R609 Discovery Miles 6 090
Malware Analysis Using Artificial…
Mark Stamp, Mamoun Alazab, … Hardcover R5,226 Discovery Miles 52 260

See more

Partners