share_book
Envoyer cet article par e-mail

Managed Code Rootkits: Hooking into Runtime Environments

ou partager sur :

share_comment
Partager ce commentaire par e-mail

ou partager sur :

PRÊT A ACHETER?
(vous pouvez toujours annuler plus tard)


J'aime
Managed Code Rootkits: Hooking into Runtime Environments

Managed Code Rootkits: Hooking into Runtime Environments

  (Auteur)


Prix : Cet article n'a pas encore de prix  ask_price

Demande de cotation sur ""
Ce titre est nouveau dans notre fonds d'ouvrages et nous ne l'avons encore jamais vendu à ce jour.
Notre engagement: Vous obtenir le meilleur prix
Aussi nombreux que soient les titres que nous référençons, absolument rien n'est automatisé dans la fixation de nos prix; et plutôt que de convertir automatiquement le prix en euros et risquer de répercuter sur vous un prix artificiellement élevé, nous vous faisons un devis rapide après avoir vérifié les prix auprès de nos différents fournisseurs.
Cette étape de demande de cotation est rapide (généralement quelques heures) et vise à vous faire bénéficier en permanence du meilleur prix pour vos achats de livres.


Sur commande

Des articles qui pourraient aussi vous intéresser

Description de "Managed Code Rootkits: Hooking into Runtime Environments"

Imagine being able to change the languages for the applicationsáthat a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks.áErez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed codeáthat a computeráis running, whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker, and countermeasures are covered, makingáthis book a one stop shop for this new attack vector. Introduces the reader briefly to managed code environments and rootkits in general Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation Focuses on managed code including Java, .NET, Android Dalvik and reviews malware development scanarios

Détails sur le produit

  • Reliure : Paperback
  • 336  pages
  • Dimensions :  2.5cmx18.8cmx23.1cm
  • Poids : 680.4g
  • Editeur :   Syngress Paru le
  • ISBN :  1597495743
  • EAN13 :  9781597495745
  • Langue : Anglais

Commentaires sur cet article

Personne n'a encore laissé de commentaire. Soyez le premier!

Laisser un commentaire

Rechercher des articles similaires par rayon

Rechercher par thèmes associés

Imagine being able to change the languages for the applicationsáthat a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks.áErez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed codeáthat a computeráis running, whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker, and countermeasures are covered, makingáthis book a one stop shop for this new attack vector. Introduces the reader briefly to managed code environments and rootkits in general Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation Focuses on managed code including Java, .NET, Android Dalvik and reviews malware development scanarios