Import It All
Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
Hacking Exposed: Malware & Rootkits Secrets & Solutions

Hacking Exposed: Malware & Rootkits Secrets & Solutions

Product ID: 14945535 Condition: New

Payflex: Pay in 4 interest-free payments of R585.50. Learn more
R 2,342
includes Duties & VAT
Delivery: 10-20 working days
Ships from USA warehouse.
Secure Transaction
VISA Mastercard payflex ozow
Buy in USA

Product Description

Hacking Exposed: Malware & Rootkits Secrets & Solutions

  • New
  • Mint Condition
  • Dispatch same day for order received before 12 noon
  • Guaranteed packaging
  • No quibbles returns

<p>"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive <p>"An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project <p><strong>Don't let another machine become a zombie in the malware army</strong></p><p>Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. </p><ul><li>Understand how malware infects, survives, and propagates across an enterprise</li><li>Learn how hackers use archivers, encryptors, and packers to obfuscate code</li><li>Implement effective intrusion detection and prevention procedures</li><li>Defend against keylogging, redirect, click fraud, and identity theft threats</li><li>Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits </li><li>Prevent malicious website, phishing, client-side, and embedded-code exploits</li><li>Protect hosts using the latest antivirus, pop-up blocker, and firewall software</li><li><div>Identify and terminate malicious processes using HIPS and NIPS</div></li></ul>

Technical Specifications

Country
USA
Brand
McGraw-Hill Education
Manufacturer
McGraw-Hill Education
Binding
Paperback
ReleaseDate
2009-10-14T00:00:01Z
EANs
9780071591188

You might also like

Back to top