Malware als Buch (gebunden)
PORTO-
FREI

Malware

Fighting Malicious Code. illustrations. Sprache: Englisch.
Buch (gebunden)
Malicious code is a set of instructions that runs on your computer and makes
your system do something that you do not want it to do. For example, it can
delete sensitive configuration files from your hard drive, rendering your
computer completely inoper … weiterlesen
Buch (gebunden)

63,49 *

inkl. MwSt.
Portofrei
Lieferbar innerhalb von zwei Wochen
Malware als Buch (gebunden)

Produktdetails

Titel: Malware
Autor/en: Ed Skoudis, Lenny Zeltser

ISBN: 0131014056
EAN: 9780131014053
Fighting Malicious Code.
illustrations.
Sprache: Englisch.
Pearson Education (US)

20. November 2003 - kartoniert - 672 Seiten

Beschreibung

Malicious code is a set of instructions that runs on your computer and makes
your system do something that you do not want it to do. For example, it can
delete sensitive configuration files from your hard drive, rendering your
computer completely inoperable; infect your computer and use it as a jumpingoff
point to spread to all of your buddies' computers; and steal files from your
machine. Malicious code in the hands of a crafty attacker is indeed powerful.
It's becoming even more of a problem because many of the very same factors
fueling the evolution of the computer industry are making our systems even
more vulnerable to malicious code. Specifically, malicious code writers benefit
from the trends toward mixing static data and executable instructions,
increasingly homogenous computing environments, unprecedented
connectivity, an ever-larger clueless user base, and an unfriendly world. Skoudis
addressed malicious code in just one chapter of his previous book. Here, a
dozen chapters focus on one of the most interesting and rapidly developing
areas of computer attacks.
*Chapter 11, Defender's Toolbox, rolls together the defensive strategies
described in the book. As a bonus, Skoudis gives recipes for creating your own
malicious code analysis laboratory using cheap hardware and software.
*Foreword by Gene Schultz, security inspector for Global Integrity.

Inhaltsverzeichnis

Foreword. Acknowledgments. 1. Introduction. Defining the Problem. Why Is Malicious Code So Prevalent? Types of Malicious Code. Malicious Code History. Why This Book? What To Expect. References. 2. Viruses. The Early History of Computer Viruses. Infection Mechanisms and Targets. Virus Propagation Mechanisms. Defending against Viruses. Malware Self-Preservation Techniques. Conclusions. Summary. References. 3. Worms. Why Worms? A Brief History of Worms. Worm Components. Impediments to Worm Spread. The Coming Super Worms. Bigger Isn't Always Better: The Un-Super Worm. Worm Defenses. Conclusions. Summary. References. 4. Malicious Mobile Code. Browser Scripts. ActiveX Controls. Java Applets. Mobile Code in E-Mail Clients. Distributed Applications and Mobile Code. Additional Defenses against Malicious Mobile Code. Conclusions. Summary. References. 5. Backdoors. Different Kinds of Backdoor Access. Installing Backdoors. Starting Backdoors Automatically. All-Purpose Network Connection Gadget: Netcat. Network Computing. Backdoors without Ports. Conclusions. Summary. References. 6. Trojan Horses. What's in a Name? Wrap Stars. Trojaning Software Distribution Sites. Poisoning the Source. Co-opting a Browser: Setiri. Hiding Data in Executables: Stego and Polymorphism. Conclusions. Summary. References. 7. User-Mode RootKits. UNIX User-mode RootKits. Windows User-Mode RootKits. Conclusions. Summary. References. 8. Kernel-Mode RootKits. What Is the Kernel? Kernel Manipulation Impact. The Linux Kernel. The Windows Kernel. Conclusions. Summary. References. 9. Going Deeper. Setting the Stage: Different Layers of Malware. Going Deeper: The Possibility of BIOS and Malware Microcode. Combo Malware. Conclusions. Summary. References. 10. Scenarios. Scenario 1: A Fly in the Ointment. Scenario 2: Invasion of the Kernel Snatchers. Scenario 3: Silence of the Worms. Conclusions. Summary. 11. Malware Analysis. Building a Malware Analysis Laboratory. Malware Analysis Process. Conclusion. Summary. References. 12. Conclusion. Useful Web Sites for Keeping Up. Parting Thoughts. Index.

Portrait

ED SKOUDIS is a computer security consultant with International Network Services. Ed's expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed secure network architectures, and responded to computer attacks. A frequent speaker on issues associated with hacker tools and effective defenses, Ed has published several articles, as well as the highly acclaimed Counter Attack: A Step-by-Step Guide to Computer Attacks and Effective Defenses (Prentice Hall PTR, 2001).

Entdecken Sie mehr
Servicehotline
089 - 70 80 99 47

Mo. - Fr. 8.00 - 20.00 Uhr
Sa. 10.00 - 20.00 Uhr
Filialhotline
089 - 30 75 75 75

Mo. - Sa. 9.00 - 20.00 Uhr
Bleiben Sie in Kontakt:
Sicher & bequem bezahlen:
akzeptierte Zahlungsarten: Überweisung, offene Rechnung,
Visa, Master Card, American Express, Paypal
Zustellung durch:
1 Mängelexemplare sind Bücher mit leichten Beschädigungen, die das Lesen aber nicht einschränken. Mängelexemplare sind durch einen Stempel als solche gekennzeichnet. Die frühere Buchpreisbindung ist aufgehoben. Angaben zu Preissenkungen beziehen sich auf den gebundenen Preis eines mangelfreien Exemplars.

2 Diese Artikel unterliegen nicht der Preisbindung, die Preisbindung dieser Artikel wurde aufgehoben oder der Preis wurde vom Verlag gesenkt. Die jeweils zutreffende Alternative wird Ihnen auf der Artikelseite dargestellt. Angaben zu Preissenkungen beziehen sich auf den vorherigen Preis.

4 Der gebundene Preis dieses Artikels wird nach Ablauf des auf der Artikelseite dargestellten Datums vom Verlag angehoben.

5 Der Preisvergleich bezieht sich auf die unverbindliche Preisempfehlung (UVP) des Herstellers.

6 Der gebundene Preis dieses Artikels wurde vom Verlag gesenkt. Angaben zu Preissenkungen beziehen sich auf den vorherigen Preis.

7 Die Preisbindung dieses Artikels wurde aufgehoben. Angaben zu Preissenkungen beziehen sich auf den vorherigen Preis.

* Alle Preise verstehen sich inkl. der gesetzlichen MwSt. Informationen über den Versand und anfallende Versandkosten finden Sie hier.