Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel 1st. Ed. Edition

4.6 out of 5 stars 53 ratings
ISBN-13: 978-0321294319
ISBN-10: 0321294319
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Share
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Amazon book clubs early access

Join or create book clubs

Choose books together

Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free.
Condition: Used: Good
Comment: Minimal Cover Wear. Small name/inscription inside the front cover of an otherwise unmarked copy. Crisp Clean Pages. Tight Binding. Pages still faintly smell new.
Access codes and supplements are not guaranteed with used items.
Get Fast, Free Shipping with Amazon Prime
FREE delivery Thursday, April 14 if you spend $25 on items shipped by Amazon. Order within 7 hrs 40 mins
Or fastest delivery Wednesday, April 13
Only 1 left in stock - order soon.
Available at a lower price from other sellers that may not offer free Prime shipping.
List Price: $64.99 Details
Save: $25.85 (40%)
FREE delivery Thursday, April 14. Order within 7 hrs 40 mins
Or fastest delivery Wednesday, April 13
Rootkits: Subverting the ... has been added to your Cart
Available at a lower price from other sellers that may not offer free Prime shipping.

Amazon First Reads | Editors' picks at exclusive prices

Frequently bought together

  • Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
  • +
  • Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
  • +
  • Reversing: Secrets of Reverse Engineering
Total price:
To see our price, add these items to your cart.
Some of these items ship sooner than the others.
Choose items to buy together.

Editorial Reviews

About the Author

Greg Hoglund has been a pioneer in the area of software security. He is CEO of HBGary, Inc., a leading provider of software security verification services. After writing one of the first network vulnerability scanners (installed in over half of all Fortune 500 companies), he created and documented the first Windows NT-based rootkit, founding rootkit.com in the process. Greg is a frequent speaker at Black Hat, RSA, and other security conferences.

James Butler, Director of Engineering at HBGary, has a world-class talent for kernel programming and rootkit development and extensive experience in host-based intrusion-detection systems. He is the developer of VICE, a rootkit detection and forensics system. Jamie's previous positions include Senior Security Software Engineer at Enterasys and Computer Scientist at the National Security Agency. He is a frequent trainer and speaker at Black Hat security conferences. He holds a masters of computer science from the University of Maryland, Baltimore County. He has published articles in the IEEE Information Assurance Workshop, Phrack, USENIX ;login:, and Information Management and Computer Security.


Product details

  • Publisher ‏ : ‎ Addison-Wesley Professional; 1st. Ed. edition (July 22, 2005)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 352 pages
  • ISBN-10 ‏ : ‎ 0321294319
  • ISBN-13 ‏ : ‎ 978-0321294319
  • Item Weight ‏ : ‎ 1.23 pounds
  • Dimensions ‏ : ‎ 7.38 x 0.8 x 9.25 inches
  • Customer Reviews:
    4.6 out of 5 stars 53 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read author blogs and more

Customer reviews

4.6 out of 5 stars
4.6 out of 5
53 global ratings

Top reviews from the United States

Reviewed in the United States on February 7, 2017
Verified Purchase
2 people found this helpful
Report abuse
Reviewed in the United States on October 24, 2015
Verified Purchase
2 people found this helpful
Report abuse
Reviewed in the United States on October 3, 2015
Verified Purchase
2 people found this helpful
Report abuse
Reviewed in the United States on May 16, 2011
Verified Purchase
5 people found this helpful
Report abuse
Reviewed in the United States on August 20, 2005
62 people found this helpful
Report abuse
Reviewed in the United States on November 12, 2012
Reviewed in the United States on August 11, 2005
7 people found this helpful
Report abuse

Top reviews from other countries

David M
4.0 out of 5 stars The content is good, but it's a tough read
Reviewed in the United Kingdom on February 1, 2015
Verified Purchase
H. S. Bassi
5.0 out of 5 stars Just another one of those proud owners of this book ...
Reviewed in the United Kingdom on February 26, 2018
Verified Purchase
Lismore
5.0 out of 5 stars In Depth Technical Read
Reviewed in the United Kingdom on July 13, 2015
Verified Purchase
M. Anish
4.0 out of 5 stars Rootkits: Subverting the Windows Kernel
Reviewed in the United Kingdom on March 10, 2006
Verified Purchase
24 people found this helpful
Report abuse
Victor Mehta
5.0 out of 5 stars This is the book definitely worth owning and having part ...
Reviewed in Canada on February 25, 2017
Verified Purchase