Hacking exposed malware and rootkits: security secrets & solutions
β Scribed by Bodmer, Sean;Davis, Michael;Elisan, Christopher C.;LeMasters, Aaron
- Publisher
- McGraw-Hill Education
- Year
- 2017
- Tongue
- English
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Arm yourself for the escalating war against malware and rootkits
Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.
β¦ Table of Contents
Part 1: MalwareChapter 1: Malware PropagationChapter 2: Malware FunctionalityPart 2: RootkitsChapter 3: User-Mode RootkitsChapter 4: Kernel-Mode RootkitsChapter 5: Virtual RootkitsChapter 6: The Future of RootkitsPart 3: Prevention TechnologiesChapter 7: AntivirusChapter 8: Host Protection SystemsChapter 9: Host Based Intrusion PreventionChapter 10: Rootkit DetectionChapter 11: General Security PracticesPart 4: AppendixAppendix A: System Integrity Analysis: Building Your Own Rootkit Detector
β¦ Subjects
Computer networks--Security measures;Computer security;Malware (Computer software);Rootkits (Computer software);Computer networks -- Security measures
π SIMILAR VOLUMES
"A harrowing guide to where the bad guys hide, and how you can find them." βDan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." βFrom the Foreword