Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
Hacking Exposed

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

    • $42.99
    • $42.99

Publisher Description

Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.

• Learn how malware infects, survives, and propagates across an enterprise

• See how hackers develop malicious code and target vulnerable systems

• Detect, neutralize, and remove user-mode and kernel-mode rootkits

• Use hypervisors and honeypots to uncover and kill virtual rootkits

• Defend against keylogging, redirect, click fraud, and identity theft

• Block spear phishing, client-side, and embedded-code exploits

• Effectively deploy the latest antivirus, pop-up blocker, and firewall software

• Identify and stop malicious processes using IPS solutions

GENRE
Computers & Internet
RELEASED
2016
December 16
LANGUAGE
EN
English
LENGTH
400
Pages
PUBLISHER
McGraw Hill LLC
SELLER
The McGraw-Hill Companies, Inc.
SIZE
25.8
MB

More Books Like This

Malware, Rootkits & Botnets A Beginner's Guide Malware, Rootkits & Botnets A Beginner's Guide
2012
The Network Security Test Lab The Network Security Test Lab
2015
Cybersecurity Cybersecurity
2013
Counter Hack Reloaded Counter Hack Reloaded
2005
The Basics of Hacking and Penetration Testing The Basics of Hacking and Penetration Testing
2013
Targeted Cyber Attacks Targeted Cyber Attacks
2014

More Books by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer & Aaron LeMasters

Other Books in This Series

Hacking Exposed 7 Hacking Exposed 7
2012
Hacking Exposed Wireless, Third Edition Hacking Exposed Wireless, Third Edition
2015
Hacking Exposed Computer Forensics, Second Edition Hacking Exposed Computer Forensics, Second Edition
2009
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
2013
Hacking Exposed Cisco Networks Hacking Exposed Cisco Networks
2006
Hacking Exposed Linux Hacking Exposed Linux
2007