Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Christopher Elisan SKU: 9780071823074
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Christopher Elisan SKU: 9780071823074

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed (TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.

* Learn how malware infects, survives, and propagates across an enterprise
* See how hackers develop malicious code and target vulnerable systems
* Detect, neutralize, and remove user-mode and kernel-mode rootkits
* Use hypervisors and honeypots to uncover and kill virtual rootkits
* Defend against keylogging, redirect, click fraud, and identity theft
* Block spear phishing, client-side, and embedded-code exploits
* Effectively deploy the latest antivirus, pop-up blocker, and firewall software
* Identify and stop malicious processes using IPS solutions

$36.00
Regular price $60.00 Sale price(Save 40%)
/
  • Free returns
  • In stock, ready to ship
  • Inventory on the way

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed (TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.

* Learn how malware infects, survives, and propagates across an enterprise
* See how hackers develop malicious code and target vulnerable systems
* Detect, neutralize, and remove user-mode and kernel-mode rootkits
* Use hypervisors and honeypots to uncover and kill virtual rootkits
* Defend against keylogging, redirect, click fraud, and identity theft
* Block spear phishing, client-side, and embedded-code exploits
* Effectively deploy the latest antivirus, pop-up blocker, and firewall software
* Identify and stop malicious processes using IPS solutions

ISBN: 9780071823074
Categories:
Author(s): Christopher Elisan
Publisher: McGraw-Hill Professional
Pages: 384
Format: Paperback
Dimensions: 9(h) x 7.25(w) x 1(d)
Weight: 652 oz
Notes: The book images and summary displayed may be of a different edition or binding of the same title

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed (TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.

* Learn how malware infects, survives, and propagates across an enterprise
* See how hackers develop malicious code and target vulnerable systems
* Detect, neutralize, and remove user-mode and kernel-mode rootkits
* Use hypervisors and honeypots to uncover and kill virtual rootkits
* Defend against keylogging, redirect, click fraud, and identity theft
* Block spear phishing, client-side, and embedded-code exploits
* Effectively deploy the latest antivirus, pop-up blocker, and firewall software
* Identify and stop malicious processes using IPS solutions

Use collapsible tabs for more detailed information that will help customers make a purchasing decision.

Ex: Shipping and return policies, size guides, and other common questions.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

You may also like
Sold Out
More from All
Sold Out
Sold Out
Sale
Sale
Sale
Sale
Recently viewed