Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

by ; ; ;
Edition: 2nd
Format: Paperback
Pub. Date: 2016-12-30
Publisher(s): McGraw Hill
List Price: $60.00

Buy New

Special Order. We will make every effort to obtain this item but cannot guarantee stock or timing.
$59.94

Rent Book

Select for Price
There was a problem. Please try again later.

Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$86.25
*To support the delivery of the digital material to you, a non-refundable digital delivery fee of $3.99 will be charged on each digital item.
$86.25*

Used Book

We're Sorry
Sold Out

Summary

The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware

Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail.

  • Counter today’s most virulent network attack types
  • Find out how malware infects, survives, and propagates across an enterprise
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Defend against keylogging, redirect, click fraud, and identity theft threats

Table of Contents

TABLE OF CONTENTSPart I: MALWARECase Study1. Method of Infection2. Malware FunctionalityPart II: ROOTKITSCase Study3. User-Mode Rootkits4. Kernel-Mode Rootkits5. Virtual Rootkits6. Future RootkitsPart III: PREVENTION TECHNOLOGIESCase Study 7. Antivirus8. Host Protection Systems9. Host-Based Intrusion Prevention10. Rootkit Detection 11. General Security PracticesAppendicesA: System Integrity Analysis

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.