005 |
|
20210621084812.0 |
010 |
|
|a 2010275038
|
015 |
|
|aGBA964216|2bnb
|
020 |
|
|a0071591184 (pbk.)
|
020 |
|
|a9780071591188 (pbk.)
|
020 |
|
|a9780071591200
|
040 |
|
|aUKM|cUKM|dBWX|dC|dFDA|dDLC|dNOU
|
041 |
0
|
|aeng
|
050 |
00
|
|aQA76.9.A25|bD378 2010
|
082 |
04
|
|a005.8|222
|
100 |
1
|
|aDavis, Michael A.
|
245 |
10
|
|aHacking Exposed Malware and Rootkits:|bMalware & Rootkits Secrets & Solutions/|h[electronic resource]/|cMichael Davis, Sean Bodmer, Aaron Lemasters.
|
246 |
3
|
|aHacking exposed malware and rootkits.
|
260 |
|
|aNew York :|bMcGraw Hill,|cc2010.
|
300 |
|
|axxii, 377 p. :|bill.
|
440 |
0
|
|amcgraw-hill e-book
|
505 |
0
|
|aPt. I, Malware. Method of infection ; Malware functionality -- Pt. II, Rootkits. User-mode rootkits ; Kernel-mode rootkits ; Virtual rootkits ; The future of rootkits : if you think it's bad now -- Pt. III, Prevention technologies. Antivirus ; Host protection systems ; Host-based intrusion prevention ; Rootkit detection ; General security practices -- Appendix. System integrity analysis : building your own rootkit detector.
|
650 |
0
|
|aComputer security.
|
655 |
7
|
|aElectronic books.|2local.
|
700 |
1
|
|aBodmer, Sean.
|
700 |
1
|
|aLeMasters, Aaron.
|
809 |
|
|pEB|dQA76.9.A25|eD263|y2010
|
856 |
40
|
|uhttps://lb30.libraryandbook.net/Book_detial/EB978007159118801|zClick for full text (McGrawHill)
|