Download Data Hiding Techniques In Windows Os Book PDF

Download full Data Hiding Techniques In Windows Os books PDF, EPUB, Tuebl, Textbook, Mobi or read online Data Hiding Techniques In Windows Os anytime and anywhere on any device. Get free access to the library by create an account, fast download and ads free. We cannot guarantee that every book is in the library.

Data Hiding Techniques in Windows OS

Data Hiding Techniques in Windows OS
  • Author : Nihad Ahmad Hassan,Rami Hijazi
  • Publisher :Unknown
  • Release Date :2016-09-08
  • Total pages :324
  • ISBN : 9780128044964
GET BOOK HERE

Summary : "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics - it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®.

Exam Prep for: Data Hiding Techniques in Windows OS

Exam Prep for: Data Hiding Techniques in Windows OS
  • Author : Anonim
  • Publisher :Unknown
  • Release Date :2021
  • Total pages :229
  • ISBN : 1230987654XX
GET BOOK HERE

Summary :

Data Hiding

Data Hiding
  • Author : Michael T. Raggo,Chet Hosmer
  • Publisher :Unknown
  • Release Date :2012-12-31
  • Total pages :350
  • ISBN : 9781597497411
GET BOOK HERE

Summary : As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention. Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7 Dives deep into the less known approaches to data hiding, covert communications, and advanced malware Includes never before published information about next generation methods of data hiding Outlines a well-defined methodology for countering threats Looks ahead at future predictions for data hiding

Digital Privacy and Security Using Windows

Digital Privacy and Security Using Windows
  • Author : Nihad Hassan,Rami Hijazi
  • Publisher :Unknown
  • Release Date :2017-07-02
  • Total pages :284
  • ISBN : 9781484227992
GET BOOK HERE

Summary : Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What You’ll Learn Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures Who This Book Is For End users, information security professionals, management, infosec students

Digital Forensics Basics

Digital Forensics Basics
  • Author : Nihad A. Hassan
  • Publisher :Unknown
  • Release Date :2019-02-25
  • Total pages :335
  • ISBN : 9781484238387
GET BOOK HERE

Summary : Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You’ll Learn Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10–specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques Who This Book Is For Police and other law enforcement personnel, judges (with no technical background), corporate and nonprofit management, IT specialists and computer security professionals, incident response team members, IT military and intelligence services officers, system administrators, e-business security professionals, and banking and insurance professionals

Windows 10 Step by Step

Windows 10 Step by Step
  • Author : Joan Lambert,Steve Lambert
  • Publisher :Unknown
  • Release Date :2015-10-28
  • Total pages :624
  • ISBN : 9780735697980
GET BOOK HERE

Summary : The quick way to learn Windows 10 This is learning made easy. Get more done quickly with Windows 10. Jump in wherever you need answers--brisk lessons and colorful screenshots show you exactly what to do, step by step. Discover fun and functional Windows 10 features! Work with the new, improved Start menu and Start screen Learn about different sign-in methods Put the Cortana personal assistant to work for you Manage your online reading list and annotate articles with the new browser, Microsoft Edge Help safeguard your computer, your information, and your privacy Manage connections to networks, devices, and storage resources

Data Hiding Fundamentals and Applications

Data Hiding Fundamentals and Applications
  • Author : Husrev T. Sencar,Mahalingam Ramkumar,Ali N. Akansu
  • Publisher :Unknown
  • Release Date :2004-09-09
  • Total pages :272
  • ISBN : 9780080488660
GET BOOK HERE

Summary : Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce. Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage. Provides a theoretical framework for data hiding, in a signal processing context Realistic applications in secure, multimedia delivery Compression robust data hiding Data hiding for proof of ownership--WATERMARKING Data hiding algorithms for image and video watermarking

File System Forensic Analysis

File System Forensic Analysis
  • Author : Brian Carrier
  • Publisher :Unknown
  • Release Date :2005-03-17
  • Total pages :229
  • ISBN : 9780134439549
GET BOOK HERE

Summary : The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools—including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for "dead analysis" Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Advances in Digital Forensics IX

Advances in Digital Forensics IX
  • Author : Gilbert Peterson,Sujeet Shenoi
  • Publisher :Unknown
  • Release Date :2013-10-09
  • Total pages :398
  • ISBN : 9783642411489
GET BOOK HERE

Summary : Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics IX describe original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Models, Forensic Techniques, File system Forensics, Network Forensics, Cloud Forensics, Forensic Tools, and Advanced Forensic Techniques. This book is the ninth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2013. Advances in Digital Forensics IX is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.

Defense against the Black Arts

Defense against the Black Arts
  • Author : Jesse Varsalone,Matthew McFadden
  • Publisher :Unknown
  • Release Date :2011-09-07
  • Total pages :412
  • ISBN : 9781439821190
GET BOOK HERE

Summary : As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you’ll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one’s IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate understanding, giving you an insider’s view of the secrets of hackers.

Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property

Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
  • Author : Lu, Chun-Shien
  • Publisher :Unknown
  • Release Date :2004-07-31
  • Total pages :268
  • ISBN : 9781591401933
GET BOOK HERE

Summary : Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained study towards an effective and practical system. This book explores the myriad of issues regarding multimedia security, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Lossless Information Hiding in Images

Lossless Information Hiding in Images
  • Author : Zhe-Ming Lu,Shi-Ze Guo
  • Publisher :Unknown
  • Release Date :2016-11-14
  • Total pages :432
  • ISBN : 9780128121665
GET BOOK HERE

Summary : Lossless Information Hiding in Images introduces many state-of-the-art lossless hiding schemes, most of which come from the authors' publications in the past five years. After reading this book, readers will be able to immediately grasp the status, the typical algorithms, and the trend of the field of lossless information hiding. Lossless information hiding is a technique that enables images to be authenticated and then restored to their original forms by removing the watermark and replacing overridden images. This book focuses on the lossless information hiding in our most popular media, images, classifying them in three categories, i.e., spatial domain based, transform domain based, and compressed domain based. Furthermore, the compressed domain based methods are classified into VQ based, BTC based, and JPEG/JPEG2000 based. Focuses specifically on lossless information hiding for images Covers the most common visual medium, images, and the most common compression schemes, JPEG and JPEG 2000 Includes recent state-of-the-art techniques in the field of lossless image watermarking Presents many lossless hiding schemes, most of which come from the authors' publications in the past five years

Security Strategies in Windows Platforms and Applications

Security Strategies in Windows Platforms and Applications
  • Author : Michael G. Solomon
  • Publisher :Unknown
  • Release Date :2010-11-15
  • Total pages :384
  • ISBN : 9780763791933
GET BOOK HERE

Summary : PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! More than 90 percent of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks against its well-publicized vulnerabilities. Written by an industry expert, Security Strategies in Windows Platforms and Applications focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system. Particular emphasis is placed on Windows XP, Vista, and 7 on the desktop, and Windows Server 2003 and 2008 versions. It highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security strategies and techniques.

Windows Forensics and Incident Recovery

Windows Forensics and Incident Recovery
  • Author : Harlan Carvey
  • Publisher :Unknown
  • Release Date :2004
  • Total pages :460
  • ISBN : UOM:39015060773325
GET BOOK HERE

Summary : The first book completely devoted to this important part of security in a Windows environment.

Multimedia Security

Multimedia Security
  • Author : Kaiser J. Giri
  • Publisher :Unknown
  • Release Date :2021
  • Total pages :229
  • ISBN : 9789811587115
GET BOOK HERE

Summary :

Web Database Applications with PHP and MySQL

Web Database Applications with PHP and MySQL
  • Author : Hugh E. Williams,David Lane
  • Publisher :Unknown
  • Release Date :2002
  • Total pages :563
  • ISBN : 0596000413
GET BOOK HERE

Summary : Combines language tutorials with application design advice to cover the PHP server-side scripting language and the MySQL database engine.

Automate the Boring Stuff with Python

Automate the Boring Stuff with Python
  • Author : Al Sweigart
  • Publisher :Unknown
  • Release Date :2015-04-14
  • Total pages :504
  • ISBN : 9781593276850
GET BOOK HERE

Summary : If you’ve ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you? In Automate the Boring Stuff with Python, you’ll learn how to use Python to write programs that do in minutes what would take you hours to do by hand—no prior programming experience required. Once you’ve mastered the basics of programming, you’ll create Python programs that effortlessly perform useful and impressive feats of automation to: –Search for text in a file or across multiple files –Create, update, move, and rename files and folders –Search the Web and download online content –Update and format data in Excel spreadsheets of any size –Split, merge, watermark, and encrypt PDFs –Send reminder emails and text notifications –Fill out online forms Step-by-step instructions walk you through each program, and practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks. Don’t spend your time doing work a well-trained monkey could do. Even if you’ve never written a line of code, you can make your computer do the grunt work. Learn how in Automate the Boring Stuff with Python. Note: The programs in this book are written to run on Python 3.

Excel Hacks

Excel Hacks
  • Author : David Hawley,Raina Hawley
  • Publisher :Unknown
  • Release Date :2007-06-20
  • Total pages :412
  • ISBN : 0596555288
GET BOOK HERE

Summary : Millions of users create and share Excel spreadsheets every day, but few go deeply enough to learn the techniques that will make their work much easier. There are many ways to take advantage of Excel's advanced capabilities without spending hours on advanced study. Excel Hacks provides more than 130 hacks -- clever tools, tips and techniques -- that will leapfrog your work beyond the ordinary. Now expanded to include Excel 2007, this resourceful, roll-up-your-sleeves guide gives you little known "backdoor" tricks for several Excel versions using different platforms and external applications. Think of this book as a toolbox. When a need arises or a problem occurs, you can simply use the right tool for the job. Hacks are grouped into chapters so you can find what you need quickly, including ways to: Reduce workbook and worksheet frustration -- manage how users interact with worksheets, find and highlight information, and deal with debris and corruption. Analyze and manage data -- extend and automate these features, moving beyond the limited tasks they were designed to perform. Hack names -- learn not only how to name cells and ranges, but also how to create names that adapt to the data in your spreadsheet. Get the most out of PivotTables -- avoid the problems that make them frustrating and learn how to extend them. Create customized charts -- tweak and combine Excel's built-in charting capabilities. Hack formulas and functions -- subjects range from moving formulas around to dealing with datatype issues to improving recalculation time. Make the most of macros -- including ways to manage them and use them to extend other features. Use the enhanced capabilities of Microsoft Office 2007 to combine Excel with Word, Access, and Outlook. You can either browse through the book or read it from cover to cover, studying the procedures and scripts to learn more about Excel. However you use it, Excel Hacks will help you increase productivity and give you hours of "hacking" enjoyment along the way.

Computer Forensics

Computer Forensics
  • Author : Warren G. Kruse II,Jay G. Heiser
  • Publisher :Unknown
  • Release Date :2001-09-26
  • Total pages :416
  • ISBN : 9780672334085
GET BOOK HERE

Summary : Every computer crime leaves tracks–you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene. Computers have always been susceptible to unwanted intrusions, but as the sophistication of computer technology increases so does the need to anticipate, and safeguard against, a corresponding rise in computer-related criminal activity. Computer forensics, the newest branch of computer security, focuses on the aftermath of a computer security incident. The goal of computer forensics is to conduct a structured investigation to determine exactly what happened, who was responsible, and to perform the investigation in such a way that the results are useful in a criminal proceeding. Written by two experts in digital investigation, Computer Forensics provides extensive information on how to handle the computer as evidence. Kruse and Heiser walk the reader through the complete forensics process–from the initial collection of evidence through the final report. Topics include an overview of the forensic relevance of encryption, the examination of digital evidence for clues, and the most effective way to present your evidence and conclusions in court. Unique forensic issues associated with both the Unix and the Windows NT/2000 operating systems are thoroughly covered. This book provides a detailed methodology for collecting, preserving, and effectively using evidence by addressing the three A's of computer forensics: Acquire the evidence without altering or damaging the original data. Authenticate that your recorded evidence is the same as the original seized data. Analyze the data without modifying the recovered data. Computer Forensics is written for everyone who is responsible for investigating digital criminal incidents or who may be interested in the techniques that such investigators use. It is equally helpful to those investigating hacked web servers, and those who are investigating the source of illegal pornography.

Introductory Computer Forensics

Introductory Computer Forensics
  • Author : Xiaodong Lin
  • Publisher :Unknown
  • Release Date :2018-11-19
  • Total pages :577
  • ISBN : 3030005801
GET BOOK HERE

Summary : This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.

Rootkits

Rootkits
  • Author : Greg Hoglund,James Butler
  • Publisher :Unknown
  • Release Date :2006
  • Total pages :324
  • ISBN : 9780321294319
GET BOOK HERE

Summary : A guide to rootkits describes what they are, how they work, how to build them, and how to detect them.