Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
Autor Christopher Elisan, Michael Davis, Sean Bodmer, Aaron LeMastersen Limba Engleză Paperback – 16 ian 2017
Arm yourself for the escalating war against malware and rootkits
Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.
• Learn how malware infects, survives, and propagates across an enterprise
• See how hackers develop malicious code and target vulnerable systems
• Detect, neutralize, and remove user-mode and kernel-mode rootkits
• Use hypervisors and honeypots to uncover and kill virtual rootkits
• Defend against keylogging, redirect, click fraud, and identity theft
• Block spear phishing, client-side, and embedded-code exploits
• Effectively deploy the latest antivirus, pop-up blocker, and firewall software
• Identify and stop malicious processes using IPS solutions
Preț: 338.54 lei
Preț vechi: 470.40 lei
-28% Nou
Puncte Express: 508
Preț estimativ în valută:
64.79€ • 66.84$ • 54.83£
64.79€ • 66.84$ • 54.83£
Carte tipărită la comandă
Livrare economică 06-12 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780071823074
ISBN-10: 0071823077
Pagini: 384
Dimensiuni: 185 x 229 x 25 mm
Greutate: 0.66 kg
Ediția:Revised
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States
ISBN-10: 0071823077
Pagini: 384
Dimensiuni: 185 x 229 x 25 mm
Greutate: 0.66 kg
Ediția:Revised
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States
Cuprins
Part 1: Malware
Chapter 1: Malware Propagation
Chapter 2: Malware Functionality
Part 2: Rootkits
Chapter 3: User-Mode Rootkits
Chapter 4: Kernel-Mode Rootkits
Chapter 5: Virtual Rootkits
Chapter 6: The Future of Rootkits
Part 3: Prevention Technologies
Chapter 7: Antivirus
Chapter 8: Host Protection Systems
Chapter 9: Host Based Intrusion Prevention
Chapter 10: Rootkit Detection
Chapter 11: General Security Practices
Part 4: Appendix
Appendix A: System Integrity Analysis: Building Your Own Rootkit Detector
Chapter 1: Malware Propagation
Chapter 2: Malware Functionality
Part 2: Rootkits
Chapter 3: User-Mode Rootkits
Chapter 4: Kernel-Mode Rootkits
Chapter 5: Virtual Rootkits
Chapter 6: The Future of Rootkits
Part 3: Prevention Technologies
Chapter 7: Antivirus
Chapter 8: Host Protection Systems
Chapter 9: Host Based Intrusion Prevention
Chapter 10: Rootkit Detection
Chapter 11: General Security Practices
Part 4: Appendix
Appendix A: System Integrity Analysis: Building Your Own Rootkit Detector