Rootkits: Subverting the Windows Kernel

Rootkits: Subverting the Windows Kernel

by Jamie Butler, Greg Hoglund
3.0 2
ISBN-10:
0321294319
ISBN-13:
9780321294319
Pub. Date:
08/05/2005
Publisher:
Addison-Wesley

Paperback - Rent for

Select a Purchase Option
  • purchase options
    $45.49 $64.99 Save 30% Current price is $45.49, Original price is $64.99. You Save 30%.
  • purchase options

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews

Rootkits: Subverting the Windows Kernel 3 out of 5 based on 0 ratings. 2 reviews.
Guest More than 1 year ago
It is rare to see a book as detailed as this on infiltrating a Microsoft machine. Hoglund and Butler give a serious, hard core technical account of several ways to subvert the operating system by the successful installation and running of a rootkit. A slight irony here. The 'root' in rootkit refers to the super user's account name on a unix machine. But the market reality is that Microsoft machines dominate the desktop. A key appeal of the book is the amount of example code that helps you, the programmer, understand how a rootkit works. Plus, the authors also run rootkit.com, from which you can download these and other example codes. While the book certainly gives good high level descriptions of rootkit strategies, the examples make these flesh. To some of you, it will be saddening to see that certain sections of the book omit those examples. Possibly the authors wanted to veer on the side of caution on those topics. There does seem to be a sligh
Guest More than 1 year ago
I just finished reading the first 21 or so pages from this book entitled 'Microsoft Spin Doctors at Work' .... I mean Rootkits:Subverting the Windows Kernel. I stopped reading after an attempt was made to convince the reader that it is ok for a software vendor to take 60 days or more to patch a security issue and that the best way to handle a security issue is to make sure no one knows about it. This book is a crock in my opinion. Wish I could get my 35 bucks back.