Search

Malware | 1st edition

by Ed Skoudis and Lenny Zeltser

Buy used book

Buy new book

  • Not in stock

Fakta

Publisher Pearson Education
Language English
Book type Paperback
Utgiven 2003-11-07
Edition 1
Pages 672
ISBN 9780131014053
Kategori(er)
Add to cart

Description



Foreword.


Acknowledgments.


1. Introduction.

Defining the Problem. Why Is Malicious Code So Prevalent? Types of Malicious Code. Malicious Code History. Why This Book? What To Expect. References.



2. Viruses.

The Early History of Computer Viruses. Infection Mechanisms and Targets. Virus Propagation Mechanisms. Defending against Viruses. Malware Self-Preservation Techniques. Conclusions. Summary. References.



3. Worms.

Why Worms? A Brief History of Worms. Worm Components. Impediments to Worm Spread. The Coming Super Worms. Bigger Isn't Always Better: The Un-Super Worm. Worm Defenses. Conclusions. Summary. References.



4. Malicious Mobile Code.

Browser Scripts. ActiveX Controls. Java Applets. Mobile Code in E-Mail Clients. Distributed Applications and Mobile Code. Additional Defenses against Malicious Mobile Code. Conclusions. Summary. References.



5. Backdoors.

Different Kinds of Backdoor Access. Installing Backdoors. Starting Backdoors Automatically. All-Purpose Network Connection Gadget: Netcat. Network Computing. Backdoors without Ports. Conclusions. Summary. References.



6. Trojan Horses.

What's in a Name? Wrap Stars. Trojaning Software Distribution Sites. Poisoning the Source. Co-opting a Browser: Setiri. Hiding Data in Executables: Stego and Polymorphism. Conclusions. Summary. References.



7. User-Mode RootKits.

UNIX User-mode RootKits. Windows User-Mode RootKits. Conclusions. Summary. References.



8. Kernel-Mode RootKits.

What Is the Kernel? Kernel Manipulation Impact. The Linux Kernel. The Windows Kernel. Conclusions. Summary. References.



9. Going Deeper.

Setting the Stage: Different Layers of Malware. Going Deeper: The Possibility of BIOS and Malware Microcode. Combo Malware. Conclusions. Summary. References.



10. Scenarios.

Scenario 1: A Fly in the Ointment. Scenario 2: Invasion of the Kernel Snatchers. Scenario 3: Silence of the Worms. Conclusions. Summary.



11. Malware Analysis.

Building a Malware Analysis Laboratory. Malware Analysis Process. Conclusion. Summary. References.



12. Conclusion.

Useful Web Sites for Keeping Up. Parting Thoughts.



Index.
Read more

Passa på att köpa kontorsmaterial

,

So far, we have reused

 2 

 3 

 3 

 4 

 7 

 7 

 9 

books.

Trustpilot

Sweden's friendliest and environmental friendliest bookshop with the lowest priced textbooks.

This is our ambition, and we do what it takes to get there. We are here to help students to save and earn money on their textbooks while we at the same time save the environment. We were started in 2005 by two students and have since strived to constantly make it easier to buy and sell used textbooks for as many as possible.

Subscribe to our newsletter

Subscribe to receive our best student tips, offers and promotions.

Read more about how we handle personal data in our privacy policy.

Looking for stationaries?

Go to Stationaries 👉
Searching...
Stäng