Hacking Exposed Malware & Rootkits, 2nd Edition
Security Secrets and Solutions
|Price||$22.94 - $60.00
|Authors||Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters|
|Format||Paper book / ebook (PDF)|
Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.
Learn how malware infects, survives, and propagates across an enterprise; See how hackers develop malicious code and target vulnerable systems; Detect, neutralize, and remove user-mode and kernel-mode rootkits; Use hypervisors and honeypots to uncover and kill virtual rootkits; Defend against keylogging, redirect, click fraud, and identity theft; Block spear phishing, client-side, and embedded-code exploits; Effectively deploy the latest antivirus, pop-up blocker, and firewall software; Identify and stop malicious processes using IPS solutions.
4 5 46
by Michael Davis, Sean Bodmer, Aaron LeMasters
Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the "black art" of malware and rootkits. You will learn how to identify and defend against malicious software and dangerous hidden scripts. The book includes practical examples, case studies, and risk ratings - all in t...
Publisher: McGraw-Hill | Release: 2009
by Aaron Philipp, David Cowen, Chris Davis
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured docume...
Price: $29.88 | Publisher: McGraw-Hill | Release: 2009
by Joel Scambray, Vincent Liu, Caleb Sima
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentic...
Price: $9.50 | Publisher: McGraw-Hill | Release: 2010
by Johnny Cache, Joshua Wright, Vincent Liu
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hija...
Price: $3.99 | Publisher: McGraw-Hill | Release: 2010
by Stuart McClure, Joel Scambray, George Kurtz
Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive a...
Price: $6.99 | Publisher: McGraw-Hill | Release: 2009
This authoritative guide will help you secure your Linux network - whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused expe...
Price: $30.00 | Publisher: McGraw-Hill | Release: 2008
by Jon Erickson
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits...
Price: $25.80 | Publisher: No Starch Press | Release: 2008
by Joel Scambray
Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstra...
Price: $40.42 | Publisher: McGraw-Hill | Release: 2007