All listings for this product
Best-selling in Adult Learning & University
Save on Adult Learning & University
- £19.50Trending at £20.12
- £9.22Trending at £11.01
- £26.45Trending at £27.79
- £19.99Trending at £23.85
- £28.00Trending at £30.30
- £15.48Trending at £19.34
- £15.72Trending at £22.86
About this product
- DescriptionIntended for those working in the field of cyber-security, this book helps the readers understand the growing threat of rootkits.
- Author BiographyGreg Hoglund has been a pioneer in the area of software security. He is CEO of HBGary, Inc., a leading provider of software security verification services. After writing one of the first network vulnerability scanners (installed in over half of all Fortune 500 companies), he created and documented the first Windows NT-based rootkit, founding rootkit.com in the process. Greg is a frequent speaker at Black Hat, RSA, and other security conferences. James Butler, Director of Engineering at HBGary, has a world-class talent for kernel programming and rootkit development and extensive experience in host-based intrusion-detection systems. He is the developer of VICE, a rootkit detection and forensics system. Jamie's previous positions include Senior Security Software Engineer at Enterasys and Computer Scientist at the National Security Agency. He is a frequent trainer and speaker at Black Hat security conferences. He holds a masters of computer science from the University of Maryland, Baltimore County. He has published articles in the IEEE Information Assurance Workshop, Phrack, USENIX;login:, and Information Management and Computer Security.
- Author(s)Greg Hoglund,Jamie Butler
- PublisherPearson Education (US)
- Date of Publication22/07/2005
- GenreComputing: Consumer Books ('Technical Trade')
- Place of PublicationNew Jersey
- Country of PublicationUnited States
- ImprintAddison-Wesley Educational Publishers Inc
- Content NoteIllustrations
- Weight560 g
- Width180 mm
- Height233 mm
- Spine19 mm
This item doesn't belong on this page.
Thanks, we'll look into this.