Professional Rootkits by Ric Vieler (2007, Paperback)

2B Read Again Books and More
(138)
PrivateRegistered as a private seller
Consumer protection regulations resulting from EU consumer law are therefore not applicable. eBay buyer protection still applies to most purchases.
US $14.00
ApproximatelyEUR 12.16
or Best Offer
Condition:
Acceptable
β€œAcceptable to good condition with wear. There is a taped tear on front cover. The rest of book ”... Read moreAbout condition
Postage:
US $5.97 (approx EUR 5.19) USPS Media MailTM.
Located in: Ore City, Texas, United States
Save on combined postage
Shop multiple items
We'll automatically apply postage discounts if you purchase two or more eligible items from the same seller.
Bundle and save
To confirm if items are eligible, simply add them to basket and you'll see the combined postage total at checkout.
Delivery:
Estimated between Fri, 28 Nov and Wed, 3 Dec to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the delivery service selected, the seller's delivery history and other factors. Delivery times may vary, especially during peak periods.
Returns:
No returns accepted.
Payments:
    Diners Club

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:255743205945
Last updated on 25 Oct, 2025 04:33:29 BSTView all revisionsView all revisions

Item specifics

Condition
Acceptable
A book with obvious wear. May have some damage to the book cover but the book is still completely intact. The binding may be slightly damaged around the edges but it is still completely intact. May have some underlining and highlighting of text and some writing in the margins, but there are no missing pages or anything else that would compromise the readability or legibility of the text. See the seller’s listing for full details and description of any imperfections. See all condition definitionsopens in a new window or tab
Seller notes
β€œAcceptable to good condition with wear. There is a taped tear on front cover. The rest of book ...
Country of Origin
United States
Educational Level
Adult & Further Education
Level
Intermediate, Advanced
Original/Facsimile
Original
ISBN
9780470101544
Category

About this product

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0470101547
ISBN-13
9780470101544
eBay Product ID (ePID)
57196221

Product Key Features

Number of Pages
360 Pages
Publication Name
Professional Rootkits
Language
English
Subject
Security / General, Operating Systems / Windows Desktop
Publication Year
2007
Type
Textbook
Author
Ric Vieler
Subject Area
Computers
Format
Perfect

Dimensions

Item Height
0.8 in
Item Weight
17.6 Oz
Item Length
9.2 in
Item Width
7.5 in

Additional Product Features

Intended Audience
Trade
LCCN
2006-101977
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Foreword.Preface.Acknowledgements.Author Bios.Introduction.1. Tools.2. A Base-Rootkit.3. Kernal Hooks.4. User Hooks.5. IO Processing.6. Communications.7. Filter Drivers.8. Key-Logging.9. Concealment.10. Email Filtering.11. Installation Considrations.12. Ghost Tracker.13. Detecting Rootkits.14. Preventing Rootkits.Appendic.Index.License Agreement(S).CD Installation Instructions.
Synopsis
Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before it's installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned andwritten by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job., Whether you want to learn how to develop a robust, full-featured rootkit or youre looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools youll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before its installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job., Whether you want to learn how to develop a robust, full-featured rootkit or youre looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools youll need., Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before it's installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.
LC Classification Number
QA76.9.A25V56 2007

Item description from the seller

About this seller

2B Read Again Books and More

100% positive Feedbackβ€’157 items sold

Joined Feb 2012
Registered as a private sellerThereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.
Bringing new life back into quality books; Saving them from being destroyed and thrown into landfills one book at a time. No wi-fi or electricity required to read a book. From continuing your ...
See more

Detailed seller ratings

Average for the last 12 months
Accurate description
--
Reasonable postage cost
--
Delivery time
--
Communication
5.0

Seller Feedback (58)

All ratingsselected
Positive
Neutral
Negative
  • 3***9 (685)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    Fast despatch and received well packaged, as described/pictured and lovely communication - thanks for your kind note and great order! Much appreciated from the UK! 🫢🏻
  • y***e (750)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    Item as described. Fast shipping. Well packaged. Thank you so much
  • l***s (59)- Feedback left by buyer.
    Past year
    Verified purchase
    The appearance in the photo is good and the seller description matched the product delivered. The book is in very good quality and the correct condition stated. The seller took care in packaging which a great value. This is a Great Seller.