Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Nonfiction, Computers, Networking & Communications, General Computing
Cover of the book Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters, McGraw-Hill Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters ISBN: 9780071825757
Publisher: McGraw-Hill Education Publication: December 16, 2016
Imprint: McGraw-Hill Education Language: English
Author: Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
ISBN: 9780071825757
Publisher: McGraw-Hill Education
Publication: December 16, 2016
Imprint: McGraw-Hill Education
Language: English

Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology. • Learn how malware infects, survives, and propagates across an enterprise • See how hackers develop malicious code and target vulnerable systems • Detect, neutralize, and remove user-mode and kernel-mode rootkits • Use hypervisors and honeypots to uncover and kill virtual rootkits • Defend against keylogging, redirect, click fraud, and identity theft • Block spear phishing, client-side, and embedded-code exploits • Effectively deploy the latest antivirus, pop-up blocker, and firewall software • Identify and stop malicious processes using IPS solutions

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology. • Learn how malware infects, survives, and propagates across an enterprise • See how hackers develop malicious code and target vulnerable systems • Detect, neutralize, and remove user-mode and kernel-mode rootkits • Use hypervisors and honeypots to uncover and kill virtual rootkits • Defend against keylogging, redirect, click fraud, and identity theft • Block spear phishing, client-side, and embedded-code exploits • Effectively deploy the latest antivirus, pop-up blocker, and firewall software • Identify and stop malicious processes using IPS solutions

More books from McGraw-Hill Education

Cover of the book Color Atlas and Synopsis of Adult Congenital Heart Disease by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Practical Electronics for Inventors, Fourth Edition by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Electromagnetic Composites Handbook, Second Edition by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Electronic Filter Design Handbook, Fourth Edition by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Selling Professional Services to the Fortune 500: How to Win in the Billion-Dollar Market of Strategy Consulting, Technology Solutions, and by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Accounting DeMYSTiFieD, 2nd Edition by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book HVAC and Refrigeration Preventive Maintenance by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Business Innovation in the Dream and Renaissance Societies (eBook Bundle) by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Analog IC Design with Low-Dropout Regulators, Second Edition by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book HTML5: 20 Lessons to Successful Web Development by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Case Files Pharmacology, Third Edition by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Building Financial Models, Chapter 10 - Preparing to Build a Full Model by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book Open Source Leadership: Reinventing Management When There’s No More Business as Usual by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book CWTS Certified Wireless Technology Specialist Study Guide (Exam PW0-070) by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Cover of the book The Mom Inventors Handbook, How to Turn Your Great Idea into the Next Big Thing, Revised and Expanded 2nd Ed by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy