eBooks-it.org Logo
eBooks-IT.org Inner Image

Bill Blunden eBooks

Download free Bill Blunden eBooks

The Rootkit Arsenal

Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal Image
2nd Edition
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally ...

Virtual Machine Design and Implementation C/C++

Virtual Machine Design and Implementation C/C++ Image
With the emergence of multiplatform production systems and network-centric computing, the software industry has witnessed the resurgence of the virtual machine. Rather than committing to any single operating system, software engineers have embraced platform-neutral development tools and run-time environments. Virtual Machine Design and Implementation in C/C++ provides an in-depth look at the construction and underlying theory of a fully functional virtual machine and an entire suite of related development tools. The book begins with a discussion of the theoretical underpinnings of the author's HEC virtual machine and its fundamental design goals, and continues with a section on the implementation of the virtual machine and its debugger. The final sec...

Memory Management

Algorithms and Implementations in C/C++
Memory Management Image
Memory Management: Algorithms and Implementation in C/C++ presents several concrete implementations of garbage collection and explicit memory management algorithms. Every implementation is complemented by an in-depth presentation of theory, followed by benchmark tests, a complete listing of C/C++ source code, and a discussion of each implementation s trade-offs. Find out how memory is managed at the hardware level by the processor Discover the ways in which different operating systems take advantage of processor facilities to provide memory services via the system call interface. Understand how development libraries and run-time systems build upon the operating system services to manage memory on behalf of user applications. Learn about five complete...


2007 - 2017 © eBooks-IT.org