Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Ben Rothke, Security Management
Alex Matrosov, Eugene Rodionov, and Sergey Bratus are experts in their field that have delivered a solid hands-on technical book. While enthralled with the stories from the trenches, I got flashbacks of my days of analyzing rootkits on SunOS and Solaris workstations about 20 years ago. It was a fun book to read.
Sven Dietrich, Cipher: the newsletter of the IEEE Computer Society's Technical Committee on Security and Privacy
"I enjoyed reading the book and learning about the malware, even if it was not particularly relevant to me, as 'I don t do Windows.' Still, there s more than enough here that s relevant to Linux users, as malware writers are now turning their attention to Linux servers."
Rik Farrow, USENIX ;login: magazine
"[A]seminal book that explains how to understand and counter sophisticated, advanced threats buried deep in a machine s boot process or UEFI firmware."
Business Wire