It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_updates/v39.i49.records.utf8:10836219:1265
Source Library of Congress
Download Link /show-records/marc_loc_updates/v39.i49.records.utf8:10836219:1265?format=raw

LEADER: 01265nam a22002898a 4500
001 2011045666
003 DLC
005 20111201193153.0
008 111201s2012 mau 001 0 eng
010 $a 2011045666
020 $a9781449626365 (pbk.)
020 $a144962636X (pbk.)
040 $aDLC$cDLC
050 00 $aQA76.9.A25$bB585 2012
082 00 $a005.8$223
100 1 $aBlunden, Bill,$d1969-
245 10 $aRootkit arsenal :$bescape and evasion in the dark corners of the system /$cBill Blunden.
250 $a2nd ed.
260 $aBurlington, Mass. :$bJones & Bartlett Learning,$c2012.
263 $a1202
300 $ap. cm.
500 $aIncludes index.
505 0 $aFoundation -- Empty cup mind -- Anti-forensics overview -- Hardware briefing -- System software briefing -- Tools of the trade -- Life in kernel space -- Post-mortem -- Defeating disk analysis -- Foiling executable analysis -- Live response -- Defeating live response -- Shellcode -- Modifying call tables -- Modifying code -- Modifying objects kernel -- Covert channels -- Going out-of-band -- Summation -- The tao of rootkits -- Epilogue.
650 0 $aRootkits (Computer software)
650 0 $aComputers$xAccess control.
650 0 $aComputer viruses.
650 0 $aComputer hackers.