Home
»
Rootkits and Bootkits
Rootkits and Bootkits
★★★★★
★★★★★
Regular price
€59.99
A01=Alex Matrosov
A01=Eugene Rodionov
A01=Sergey Bratus
Age Group_Uncategorized
Age Group_Uncategorized
Author_Alex Matrosov
Author_Eugene Rodionov
Author_Sergey Bratus
automatic-update
BIOS
Category1=Non-Fiction
Category=URJ
cia
computer
computer architecture
computer books
computer security
computers
COP=United States
crime
cyber
cyber security
cyber security books
cybercrime
cybersecurity
dark web
Delivery_Delivery within 10-20 working days
emulation
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
Festi
forensic analysis
hackers
hacking
hacking books
information security
Language_English
malware
malware analysis
mystery
network security
networking
operating systems
PA=In stock
penetration test
penetration testing
Price_€50 to €100
privacy
PS=Active
reverse engineering
rootkits
security
softlaunch
statistics
superhero
surveillance
tech
technology
thriller
US
virtualization
Windows
Product details
- ISBN 9781593277161
- Dimensions: 180 x 235mm
- Publication Date: 03 May 2019
- Publisher: No Starch Press,US
- Publication City/Country: US
- Product Form: Paperback
- Language: English
Delivery/Collection within 10-20 working days
Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock
10-20 Working Days: On Backorder
Will Deliver When Available: On Pre-Order or Reprinting
We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!
Security experts Alex Matrosov, Eugene Rodionov, and Sergey Bratus share the knowledge they've gained over years of professional research to help you counter threats. We're talking hard stuff - attacks buried deep in a machine's boot process or UEFI firmware that keep malware analysts up late at night. With these field notes, you'll trace malware evolution from rootkits like TDL3 to present day UEFI implants and examine how these malware infect the system, persist through reboot, and evade security software. The game is not lost.
Alex Matrosov is a leading offensive security researcher at NVIDIA. He has more than two decades of experience with reverse engineering, advanced malware analysis, firmware security, and exploitation techniques. Before joining NVIDIA, Alex served as Principal Security Researcher at Intel Security Center of Excellence (SeCoE), spent more than six years in the Intel Advanced Threat Research team, and was Senior Security Researcher at ESET. Alex has authored and co-authored numerous research papers and is a frequent speaker at security conferences, including REcon, ZeroNights, Black Hat, DEFCON, and others. Alex received an award from Hex-Rays for his open source plug-in HexRaysCodeXplorer, supported since 2013 by the team at REhint.
Eugene Rodionov, PhD, is a Security Researcher at Intel working in BIOS security for Client Platforms. Before that, Rodionov ran internal research projects and performed in-depth analysis of complex threats at ESET. His fields of interest include firmware security, kernel-mode programming, anti-rootkit technologies, and reverse engineering. Rodionov has spoken at security conferences, such as Black Hat, REcon, ZeroNights, and CARO, and has co-authored numerous research papers.
Sergey Bratus is a Research Associate Professor in the Computer Science Department at Dartmouth College. He has previously worked at BBN Technologies on Natural Language Processing research. Bratus is interested in all aspects of Unix security, in particular Linux kernel security, and detection and reverse engineering of Linux malware.
Eugene Rodionov, PhD, is a Security Researcher at Intel working in BIOS security for Client Platforms. Before that, Rodionov ran internal research projects and performed in-depth analysis of complex threats at ESET. His fields of interest include firmware security, kernel-mode programming, anti-rootkit technologies, and reverse engineering. Rodionov has spoken at security conferences, such as Black Hat, REcon, ZeroNights, and CARO, and has co-authored numerous research papers.
Sergey Bratus is a Research Associate Professor in the Computer Science Department at Dartmouth College. He has previously worked at BBN Technologies on Natural Language Processing research. Bratus is interested in all aspects of Unix security, in particular Linux kernel security, and detection and reverse engineering of Linux malware.
Qty:
