HACKING EXPOSED MALWARE AND ROOTKITS

Michael A. Davis SKU: 9780071591188
HACKING EXPOSED MALWARE AND ROOTKITS

HACKING EXPOSED MALWARE AND ROOTKITS

Michael A. Davis SKU: 9780071591188

"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterprise Learn how hackers use archivers, encryptors, and packers to obfuscate code Implement effective intrusion detection and prevention procedures Defend against keylogging, redirect, click fraud, and identity theft threats Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploits Protect hosts using the latest antivirus, pop-up blocker, and firewall software Identify and terminate malicious processes using HIPS and NIPS

$34.20
Regular price $57.00 Sale price(Save 40%)
/
  • Free returns
  • In stock, ready to ship
  • Inventory on the way

"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterprise Learn how hackers use archivers, encryptors, and packers to obfuscate code Implement effective intrusion detection and prevention procedures Defend against keylogging, redirect, click fraud, and identity theft threats Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploits Protect hosts using the latest antivirus, pop-up blocker, and firewall software Identify and terminate malicious processes using HIPS and NIPS

ISBN: 9780071591188
Categories:
Author(s): Michael A. Davis
Publisher: Osborne/McGraw-Hill
Pages: 400
Format: Paperback
Dimensions: 9.25(h) x 7.5(w) x 0.75(d)
Weight: 680 oz
Notes: The book images and summary displayed may be of a different edition or binding of the same title

"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterprise Learn how hackers use archivers, encryptors, and packers to obfuscate code Implement effective intrusion detection and prevention procedures Defend against keylogging, redirect, click fraud, and identity theft threats Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploits Protect hosts using the latest antivirus, pop-up blocker, and firewall software Identify and terminate malicious processes using HIPS and NIPS

Use collapsible tabs for more detailed information that will help customers make a purchasing decision.

Ex: Shipping and return policies, size guides, and other common questions.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

You may also like
More from Michael A. Davis
Sold Out
More from All
Sold Out
Sold Out
Sale
Sale
Sale
Sale
Recently viewed