9780071823074

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

by ; ; ;
  • ISBN13:

    9780071823074

  • ISBN10:

    0071823077

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 1/6/2017
  • Publisher: McGraw-Hill Education
  • Purchase Benefits
  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $60.00 Save up to $9.00
  • Buy New
    $51.00

    NOT YET PRINTED. PLACE AN ORDER AND WE WILL SHIP IT AS SOON AS IT ARRIVES.

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

Summary

The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware

Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail.

  • Counter today’s most virulent network attack types
  • Find out how malware infects, survives, and propagates across an enterprise
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Defend against keylogging, redirect, click fraud, and identity theft threats

Table of Contents

TABLE OF CONTENTSPart I: MALWARECase Study1. Method of Infection2. Malware FunctionalityPart II: ROOTKITSCase Study3. User-Mode Rootkits4. Kernel-Mode Rootkits5. Virtual Rootkits6. Future RootkitsPart III: PREVENTION TECHNOLOGIESCase Study 7. Antivirus8. Host Protection Systems9. Host-Based Intrusion Prevention10. Rootkit Detection 11. General Security PracticesAppendicesA: System Integrity Analysis

Rewards Program

Write a Review