did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780071823074

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

by ; ; ;
  • ISBN13:

    9780071823074

  • ISBN10:

    0071823077

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2016-12-30
  • Publisher: McGraw Hill
  • Purchase Benefits
List Price: $60.00 Save up to $6.00
  • Buy New
    $58.20
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 3-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware

Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail.

  • Counter today’s most virulent network attack types
  • Find out how malware infects, survives, and propagates across an enterprise
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Defend against keylogging, redirect, click fraud, and identity theft threats

Table of Contents

TABLE OF CONTENTSPart I: MALWARECase Study1. Method of Infection2. Malware FunctionalityPart II: ROOTKITSCase Study3. User-Mode Rootkits4. Kernel-Mode Rootkits5. Virtual Rootkits6. Future RootkitsPart III: PREVENTION TECHNOLOGIESCase Study 7. Antivirus8. Host Protection Systems9. Host-Based Intrusion Prevention10. Rootkit Detection 11. General Security PracticesAppendicesA: System Integrity Analysis

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program