Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Nonfiction, Computers, Networking & Communications, General Computing
Cover of the book Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters, McGraw-Hill Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters ISBN: 9780071825757
Publisher: McGraw-Hill Education Publication: December 16, 2016
Imprint: McGraw-Hill Education Language: English
Author: Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
ISBN: 9780071825757
Publisher: McGraw-Hill Education
Publication: December 16, 2016
Imprint: McGraw-Hill Education
Language: English

Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology. • Learn how malware infects, survives, and propagates across an enterprise • See how hackers develop malicious code and target vulnerable systems • Detect, neutralize, and remove user-mode and kernel-mode rootkits • Use hypervisors and honeypots to uncover and kill virtual rootkits • Defend against keylogging, redirect, click fraud, and identity theft • Block spear phishing, client-side, and embedded-code exploits • Effectively deploy the latest antivirus, pop-up blocker, and firewall software • Identify and stop malicious processes using IPS solutions

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology. • Learn how malware infects, survives, and propagates across an enterprise • See how hackers develop malicious code and target vulnerable systems • Detect, neutralize, and remove user-mode and kernel-mode rootkits • Use hypervisors and honeypots to uncover and kill virtual rootkits • Defend against keylogging, redirect, click fraud, and identity theft • Block spear phishing, client-side, and embedded-code exploits • Effectively deploy the latest antivirus, pop-up blocker, and firewall software • Identify and stop malicious processes using IPS solutions

More books from McGraw-Hill Education

Cover of the book Handbook of Pediatric Anesthesia by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Moving the Earth: Excavation Equipment, Methods, Safety, and Cost, Seventh Edition by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Schaum's Outline of Basic Business Mathematics, 2ed by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Oracle Database 11g Release 2 High Availability: Maximize Your Availability with Grid Infrastructure, RAC and Data Guard by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Building Financial Models, Third Edition: The Complete Guide to Designing, Building, and Applying Projection Models by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Food Fight by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book The Strip-Built Sea Kayak: Three Rugged, Beautiful Boats You Can Build by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book The Nalco Guide to Boiler Failure Analysis, Second Edition by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Design for Six Sigma for Service, Chapter 3 - Value Creation for Service Product by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Building Strip-Planked Boats by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Emerging Markets Rule: Growth Strategies of the New Global Giants by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Morgan and Mikhail's Clinical Anesthesiology Flashcards by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book The McKinsey Mind: Understanding and Implementing the Problem-Solving Tools and Management Techniques of the World's Top Strategic Consulting Firm by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book CompTIA Cloud+ Certification Bundle (Exam CV0-002) by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book MANUFACTURING PLANNING AND CONTROL SYSTEMS FOR SUPPLY CHAIN MANAGEMENT by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy