Bienvenue chez nous!
Logo Ex Libris

Hacking Exposed Malware & Rootkits

  • Livre de poche
  • 360 Nombre de pages
Michael A. Davis is CEO of Savid Technologies, Inc. a national technology and security consulting firm. Michael is well known in ... Lire la suite
CHF 77.90
Habituellement expédié sous 5 à 7 jours ouvrés.
Pas de droit de retour!

Description

Auteur

Michael A. Davis is CEO of Savid Technologies, Inc. a national technology and security consulting firm. Michael is well known in the Open Source Security industry with his porting of security tools to the Windows platforms including tools such as snort, ngrep, dsniff, and honeyd. Michael is also a member of the Honeynet project where he is working to develop data and network control mechanisms for windows based honeynets. Michael is also the developer of sebek for windows, a kernel based data collection and monitoring tool for honeynets. Michael has worked with McAfee, Inc. a leader in anti-virus protection and vulnerability management, as Senior Manager of Global Threats where he lead a team of researchers investigating confidential and cutting edge security research. Prior to McAfee, Michael A. Davis worked at Foundstone.



Texte du rabat

Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed(TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.

. Learn how malware infects, survives, and propagates across an enterprise . See how hackers develop malicious code and target vulnerable systems . Detect, neutralize, and remove user-mode and kernel-mode rootkits . Use hypervisors and honeypots to uncover and kill virtual rootkits . Defend against keylogging, redirect, click fraud, and identity theft . Block spear phishing, client-side, and embedded-code exploits . Effectively deploy the latest antivirus, pop-up blocker, and firewall software . Identify and stop malicious processes using IPS solutions



Résumé
Fully updated to cover the most current tools, techniques, and exploits, this new edition presents the latest Hacking Exposed strategies for defending against the world's number one attack type: malware

Contenu

Part 1: Malware
Chapter 1: Malware Propagation
Chapter 2: Malware Functionality

Part 2: Rootkits
Chapter 3: User-Mode Rootkits
Chapter 4: Kernel-Mode Rootkits
Chapter 5: Virtual Rootkits
Chapter 6: The Future of Rootkits

Part 3: Prevention Technologies
Chapter 7: Antivirus
Chapter 8: Host Protection Systems
Chapter 9: Host Based Intrusion Prevention
Chapter 10: Rootkit Detection
Chapter 11: General Security Practices

Part 4: Appendix
Appendix A: System Integrity Analysis: Building Your Own Rootkit Detector

Détails sur le produit

Titre: Hacking Exposed Malware & Rootkits
Sous-titre: Security Secrets and Solutions
Auteur:
Code EAN: 9780071823074
ISBN: 0071823077
Format: Livre de poche
Producteur: Osborne mcgraw-hill
Editeur: McGraw-Hill
Genre: IT et informatique
nombre de pages: 360
Poids: 571g
Taille: H231mm x B187mm x T25mm
Parution: 30.01.2017
Année: 2017
Auflage: 2. Auflage.