Table of Contents
- Section I: Malware
- Case Study 1
- Chapter 1 - Method of Infection
- Chapter 2 - Malware Functionality
- Section II: Rootkits
- Case Study 2
- Chapter 3 - User Mode Rootkits
- Chapter 4 - Kernel Mode Rootkits
- Chapter 5 - Virtual Rootkits
- Chapter 6 - The Future of Rootkits
- Section III: Prevention Technologies
- Case Study 3
- Chapter 7 - Anti-Virus
- Chapter 8 - Personal Firewalls/Pop Up Blockers
- Chapter 9 - Host Based Intrusion Prevention
- Chapter 10 - Anti-Rootkit Technology
- Chapter 11 - General Security Practices
- Appendix A - Building your own rootkit detector
- Appendix B - About the Companion Web Site
- Appendix C - Links and Resources
Foreword
Please check back at a later date.