Stock Image

A Study of Rootkit Stealth Techniques and Associated Detection Methods

Daniel D. Nerenberg

0 ratings by Goodreads
ISBN 10: 1249836123 / ISBN 13: 9781249836124
Published by BiblioScholar
New Condition: New Soft cover
From BuySomeBooks (Las Vegas, NV, U.S.A.)

AbeBooks Seller Since May 21, 2012

Quantity Available: > 20

Buy New
List Price: US$ 49.00
Price: US$ 71.96 Convert Currency
Shipping: Free Within U.S.A. Destination, Rates & Speeds
Add to basket

30 Day Return Policy

About this Item

88 pages. Dimensions: 9.7in. x 7.4in. x 0.2in.In todays world of advanced computing power at the fingertips of any user, we must constantly think of computer security. Information is power and this power is had within our computer systems. If we can not trust the information within our computer systems then we can not properly wield the power that comes from such information. Rootkits are software programs that are designed to develop and maintain an environment in which malware may hide on a computer system after successful compromise of that computer system. Rootkits cut at the very foundation of the trust that we put in our information and subsequent power. This thesis seeks to understand rootkit hiding techniques, rootkit finding techniques and develops attack trees and defense trees in order to help us identify deficiencies in detection to further increase the trust in our information systems. This item ships from multiple locations. Your book may arrive from Roseburg,OR, La Vergne,TN. Bookseller Inventory # 9781249836124

Ask Seller a Question

Bibliographic Details

Title: A Study of Rootkit Stealth Techniques and ...

Publisher: BiblioScholar

Binding: Paperback

Book Condition:New

Book Type: Paperback

About this title

Synopsis:

In today's world of advanced computing power at the fingertips of any user, we must constantly think of computer security. Information is power and this power is had within our computer systems. If we can not trust the information within our computer systems then we can not properly wield the power that comes from such information. Rootkits are software programs that are designed to develop and maintain an environment in which malware may hide on a computer system after successful compromise of that computer system. Rootkits cut at the very foundation of the trust that we put in our information and subsequent power. This thesis seeks to understand rootkit hiding techniques, rootkit finding techniques and develops attack trees and defense trees in order to help us identify deficiencies in detection to further increase the trust in our information systems.

"About this title" may belong to another edition of this title.

Store Description

BuySomeBooks is great place to get your books online. With over eight million titles available we're sure to have what you're looking for. Despite having a large selection of new books available for immediate shipment and excellent customer service, people still tell us they prefer us because of our prices.

Visit Seller's Storefront

Terms of Sale:

We guarantee the condition of every book as it's described on the Abebooks web
sites. If you're dissatisfied with your purchase (Incorrect Book/Not as
Described/Damaged) or if the order hasn't arrived, you're eligible for a refund
within 30 days of the estimated delivery date. If you've changed your mind about a book that you've ordered, please use the Ask bookseller a question link to contact us and we'll respond within 2 business days.

BuySomeBooks is operated by Drive-On-In, Inc., a Nevada co...

More Information
Shipping Terms:

Orders usually ship within 1-2 business days. Books are shipped from multiple locations so your order may arrive from Las Vegas,NV, Roseburg,OR, La Vergne,TN, Momence,IL, or Commerce,GA.

List this Seller's Books

Payment Methods
accepted by seller

Visa Mastercard American Express