Picture 1 of 11










Gallery
Picture 1 of 11











Have one to sell?
Professional Rootkits by Ric Vieler (2007, Paperback)
US $14.00
ApproximatelyEUR 12.16
or Best Offer
Condition:
βAcceptable to good condition with wear. There is a taped tear on front cover. The rest of book β... Read moreAbout condition
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
US $5.97 (approx EUR 5.19) USPS Media MailTM.
Located in: Ore City, Texas, United States
Save on combined postage
Delivery:
Estimated between Fri, 28 Nov and Wed, 3 Dec to 94104
Returns:
No returns accepted.
Payments:
Shop with confidence
About this item
Seller assumes all responsibility for this listing.
eBay item number:255743205945
Item specifics
- Condition
- Acceptable
- Seller notes
- Country of Origin
- United States
- Educational Level
- Adult & Further Education
- Level
- Intermediate, Advanced
- Original/Facsimile
- Original
- ISBN
- 9780470101544
About this product
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0470101547
ISBN-13
9780470101544
eBay Product ID (ePID)
57196221
Product Key Features
Number of Pages
360 Pages
Publication Name
Professional Rootkits
Language
English
Subject
Security / General, Operating Systems / Windows Desktop
Publication Year
2007
Type
Textbook
Subject Area
Computers
Format
Perfect
Dimensions
Item Height
0.8 in
Item Weight
17.6 Oz
Item Length
9.2 in
Item Width
7.5 in
Additional Product Features
Intended Audience
Trade
LCCN
2006-101977
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Foreword.Preface.Acknowledgements.Author Bios.Introduction.1. Tools.2. A Base-Rootkit.3. Kernal Hooks.4. User Hooks.5. IO Processing.6. Communications.7. Filter Drivers.8. Key-Logging.9. Concealment.10. Email Filtering.11. Installation Considrations.12. Ghost Tracker.13. Detecting Rootkits.14. Preventing Rootkits.Appendic.Index.License Agreement(S).CD Installation Instructions.
Synopsis
Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before it's installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned andwritten by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job., Whether you want to learn how to develop a robust, full-featured rootkit or youre looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools youll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before its installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job., Whether you want to learn how to develop a robust, full-featured rootkit or youre looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools youll need., Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before it's installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.
LC Classification Number
QA76.9.A25V56 2007
Item description from the seller
About this seller
2B Read Again Books and More
100% positive Feedbackβ’157 items sold
Registered as a private sellerThereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.
Seller Feedback (58)
- 3***9 (685)- Feedback left by buyer.Past 6 monthsVerified purchaseFast despatch and received well packaged, as described/pictured and lovely communication - thanks for your kind note and great order! Much appreciated from the UK! π«Άπ»Elizabeth Cadbury 1858-1951 By Richenda Scott 1956 2nd Impression Hardcover w/DJ (#255679256407)
- y***e (750)- Feedback left by buyer.Past 6 monthsVerified purchaseItem as described. Fast shipping. Well packaged. Thank you so much
- l***s (59)- Feedback left by buyer.Past yearVerified purchaseThe appearance in the photo is good and the seller description matched the product delivered. The book is in very good quality and the correct condition stated. The seller took care in packaging which a great value. This is a Great Seller.Writing with Clarity and Style : A Guide to Rhetorical Devices for... (#256682883798)
More to explore:
- Non-Fiction Professional Development Paperback Fiction & Books,
- Business, Economics & Industry Non-Fiction Professional Finance Paperback Fiction & Non-Fiction Books in English,
- Professional Finance Books and Magazines,
- Paperback Biography and Autobiography,
- Paperback Non-Fiction Books,
- Romance Paperback Fiction Books,
- It Stephen King Paperback Books,
- Paperback Fiction Books in English,
- Agatha Christie Paperback Fiction & Books,
- Paperback Western Fiction Books

