Hacking Exposed Malware & Rootkits (Hacking Exposed)

Hacking Exposed Malware & Rootkits (Hacking Exposed) pdf epub mobi txt 電子書 下載2025

Michael A. Davis is CEO of Savid Technologies, Inc., a technology and security consulting firm. He has worked with McAfee, Inc., as senior manager of Global Threats. Michael is a member of the Honeynet Project.

Sean M. Bodmer is director of government programs at Savid Corporation, Inc. He is an active honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Sean works with the Honeynet Project and the Hacker Profiling Project.

Aaron LeMasters is a security researcher specializing in computer forensics, malware analysis, and vulnerability research. He spent five years defending the undefendable DoD networks and is now a senior software engineer at Raytheon SI.

出版者:McGraw-Hill Osborne Media
作者:Michael Davis
出品人:
頁數:400
译者:
出版時間:2009-9-23
價格:USD 49.99
裝幀:Paperback
isbn號碼:9780071495660
叢書系列:
圖書標籤:
  • 計算機 
  • Hacking 
  •  
想要找書就要到 小美書屋
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive

"An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project

Don't let another machine become a zombie in the malware army

Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.

Understand how malware infects, survives, and propagates across an enterprise

Learn how hackers use archivers, encryptors, and packers to obfuscate code

Implement effective intrusion detection and prevention procedures

Defend against keylogging, redirect, click fraud, and identity theft threats

Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits

Prevent malicious website, phishing, client-side, and embedded-code exploits

Protect hosts using the latest antivirus, pop-up blocker, and firewall software

Identify and terminate malicious processes using HIPS and NIPS

具體描述

讀後感

評分

評分

評分

評分

評分

用戶評價

评分

评分

评分

评分

评分

本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

© 2025 book.quotespace.org All Rights Reserved. 小美書屋 版权所有