Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.5.
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.5.
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
US$ 29.88
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Condition: new.
Seller: Chiron Media, Wallingford, United Kingdom
US$ 48.74
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New.
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
US$ 53.20
Convert currencyQuantity: Over 20 available
Add to basketPaperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. 710.
Seller: Revaluation Books, Exeter, United Kingdom
US$ 47.78
Convert currencyQuantity: 2 available
Add to basketPaperback. Condition: Brand New. 1st edition. 336 pages. 9.10x7.40x1.00 inches. In Stock.
Seller: Brook Bookstore On Demand, Napoli, NA, Italy
US$ 49.78
Convert currencyQuantity: Over 20 available
Add to basketCondition: new. Questo è un articolo print on demand.
Seller: AHA-BUCH GmbH, Einbeck, Germany
US$ 65.82
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks, which are developed in intermediate language. The initial part of the book offers an overview of managed code rootkits. It explores environment models of managed code and the relationship of managed code to rootkits by studying how they use application VMs. It also discusses attackers of managed code rootkits and various attack scenarios. The second part of the book covers the development of managed code rootkits, starting with the tools used in producing managed code rootkits through their deployment. The next part focuses on countermeasures that can possibly be used against managed code rootkits, including technical solutions, prevention, detection, and response tactics. The book concludes by presenting techniques that are somehow similar to managed code rootkits, which can be used in solving problems.