Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
<p><b>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, <span style="white-space:pre"></span>authenticity, or access to any online entitlements included with the product.</b></p><p><strong><br></strong></p><p><strong>Arm yourself for the escalating war against malware and rootkits</strong></p><p>Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide.<em> Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition</em> fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.</p><p>• Learn how malware infects, survives, and propagates across an enterprise<br>• See how hackers develop malicious code and target vulnerable systems<br>• Detect, neutralize, and remove user-mode and kernel-mode rootkits <br>• Use hypervisors and honeypots to uncover and kill virtual rootkits<br>• Defend against keylogging, redirect, click fraud, and identity theft<br>• Block spear phishing, client-side, and embedded-code exploits<br>• Effectively deploy the latest antivirus, pop-up blocker, and firewall software<br>• Identify and stop malicious processes using IPS solutions<br></p>