Personnaliser

OK

A Study of Rootkit Stealth Techniques and Associated Detection Methods - Nerenberg, Daniel D

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

21,85 €

Produit Neuf

  • Livraison à 0,01 €
  • Livré entre le 12 et le 19 mai
Voir les modes de livraison

RiaChristie

PRO Vendeur favori

4,9/5 sur + de 1 000 ventes

Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781025097510_dbm

Publicité
 
Vous avez choisi le retrait chez le vendeur à
  • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
  • Récupérez le produit directement chez le vendeur
  • Rakuten vous rembourse en cas de problème

Gratuit et sans engagement

Félicitations !

Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

En savoir plus

Retour

Horaires

      Note :


      Avis sur A Study Of Rootkit Stealth Techniques And Associated Detection Methods Format Broché  - Livre

      Note : 0 0 avis sur A Study Of Rootkit Stealth Techniques And Associated Detection Methods Format Broché  - Livre

      Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


      Présentation A Study Of Rootkit Stealth Techniques And Associated Detection Methods Format Broché

       - Livre

      Livre - Nerenberg, Daniel D - 01/05/2025 - Broché - Langue : Anglais

      . .

    • Auteur(s) : Nerenberg, Daniel D
    • Editeur : Creative Media Partners, Llc
    • Langue : Anglais
    • Parution : 01/05/2025
    • Format : Moyen, de 350g à 1kg
    • Nombre de pages : 86.0
    • ISBN : 9781025097510



    • Résumé :

      In today's world of advanced computing power at the fingertips of any user, we must constantly think of computer security. Information is power and this power is had within our computer systems. If we can not trust the information within our computer systems then we can not properly wield the power that comes from such information. Rootkits are software programs that are designed to develop and maintain an environment in which malware may hide on a computer system after successful compromise of that computer system. Rootkits cut at the very foundation of the trust that we put in our information and subsequent power. This thesis seeks to understand rootkit hiding techniques, rootkit finding techniques and develops attack trees and defense trees in order to help us identify deficiencies in detection to further increase the trust in our information systems.

      This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.

      This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.

      As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.


      ...

      Détails de conformité du produit

      Consulter les détails de conformité de ce produit (

      Personne responsable dans l'UE

      )
      Le choixNeuf et occasion
      Minimum5% remboursés
      La sécuritéSatisfait ou remboursé
      Le service clientsÀ votre écoute
      LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
      visavisa
      mastercardmastercard
      klarnaklarna
      paypalpaypal
      floafloa
      americanexpressamericanexpress
      Rakuten Logo
      • Rakuten Kobo
      • Rakuten TV
      • Rakuten Viber
      • Rakuten Viki
      • Plus de services
      • À propos de Rakuten
      Rakuten.com