𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Hacking exposed malware and rootkits: security secrets & solutions

✍ Scribed by Bodmer, Sean;Davis, Michael;Elisan, Christopher C.;LeMasters, Aaron


Publisher
McGraw-Hill Education
Year
2017
Tongue
English
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.

  • Learn how malware infects, survives, and propagates across an enterprise
  • See how hackers develop malicious code and target vulnerable systems
  • Detect, neutralize, and remove user-mode and kernel-mode rootkits
  • Use hypervisors and honeypots to uncover and kill virtual rootkits
  • Defend against...
  • ✦ Table of Contents


    Part 1: MalwareChapter 1: Malware PropagationChapter 2: Malware FunctionalityPart 2: RootkitsChapter 3: User-Mode RootkitsChapter 4: Kernel-Mode RootkitsChapter 5: Virtual RootkitsChapter 6: The Future of RootkitsPart 3: Prevention TechnologiesChapter 7: AntivirusChapter 8: Host Protection SystemsChapter 9: Host Based Intrusion PreventionChapter 10: Rootkit DetectionChapter 11: General Security PracticesPart 4: AppendixAppendix A: System Integrity Analysis: Building Your Own Rootkit Detector

    ✦ Subjects


    Computer networks--Security measures;Computer security;Malware (Computer software);Rootkits (Computer software);Computer networks -- Security measures


    πŸ“œ SIMILAR VOLUMES


    Hacking exposed malware & rootkits: malw
    ✍ Michael A. Davis, Sean M. Bodmer, Aaron LeMasters πŸ“‚ Library πŸ“… 2009 πŸ› McGraw-Hill 🌐 English

    "A harrowing guide to where the bad guys hide, and how you can find them." β€”Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." β€”From the Foreword