HACKING EXPOSED MALWARE AND ROOTKITS

Valutazione media 4,13
( su 39 valutazioni fornite da GoodReads )
 
9780071591188: HACKING EXPOSED MALWARE AND ROOTKITS

"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive

"An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project

Don't let another machine become a zombie in the malware army

Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.

  • Understand how malware infects, survives, and propagates across an enterprise
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Implement effective intrusion detection and prevention procedures
  • Defend against keylogging, redirect, click fraud, and identity theft threats
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Prevent malicious website, phishing, client-side, and embedded-code exploits
  • Protect hosts using the latest antivirus, pop-up blocker, and firewall software
  • Identify and terminate malicious processes using HIPS and NIPS

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

L'autore:

Michael A. Davis is CEO of Savid Technologies, Inc., a technology and security consulting firm. He has worked with McAfee, Inc., as senior manager of Global Threats. Michael is a member of the Honeynet Project.

Sean M. Bodmer is director of government programs at Savid Corporation, Inc. He is an active honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Sean works with the Honeynet Project and the Hacker Profiling Project.

Aaron LeMasters is a security researcher specializing in computer forensics, malware analysis, and vulnerability research. He spent five years defending the undefendable DoD networks and is now a senior software engineer at Raytheon SI.

Contenuti:

Part I Malware
Case Study: Please Review This Before Our Quarterly Meeting
Chapter 1 Method of Infection
Chapter 2 Malware Functionality
Part II Rootkits
Case Study: The Invisible Rootkit That Steals Your Bank Account Data
Chapter 3 User-Mode Rootkits
Chapter 4 Kernel-Mode Rootkits
Chapter 5 Virtual Rootkits
Chapter 6 The Future of Rootkits: If You Think It's Bad Now
Part III Prevention Technologies
Case Study: A Wolf In Sheep's Clothing
Chapter 7 Antivirus
Chapter 8 Host Protection Systems
Chapter 9 Host-Based Intrusion Prevention
Chapter 10 Rootkit Detection
Chapter 11 General Security Practices
Appendix A System Integrity Analysis: Building Your Own Rootkit Detector
Index

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

I migliori risultati di ricerca su AbeBooks

1.

Davis, Michael A.
ISBN 10: 0071591184 ISBN 13: 9780071591188
Nuovi Paperback Quantità: > 20
Da
BargainBookStores
(Grand Rapids, MI, U.S.A.)
Valutazione libreria
[?]

Descrizione libro Paperback. Condizione libro: New. Codice libro della libreria 1707178

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 34,59
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,71
In U.S.A.
Destinazione, tempi e costi

2.

Michael Davis, Sean Bodmer, Aaron LeMasters
Editore: McGraw-Hill Osborne Media (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
Nuovi Paperback Quantità: 1
Da
Ergodebooks
(RICHMOND, TX, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Osborne Media, 2009. Paperback. Condizione libro: New. 1. Codice libro della libreria DADAX0071591184

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 34,82
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,71
In U.S.A.
Destinazione, tempi e costi

3.

Michael A. Davis, Sean M. Bodmer, Jason Lord
Editore: McGraw-Hill Education - Europe, United States (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
Nuovi Paperback Quantità: 10
Da
The Book Depository
(London, Regno Unito)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education - Europe, United States, 2009. Paperback. Condizione libro: New. 229 x 185 mm. Language: English . Brand New Book. A harrowing guide to where the bad guys hide, and how you can find them. --Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face. --From the Foreword by Lance Spitzner, President of the Honeynet Project Don t let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today s hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterprise Learn how hackers use archivers, encryptors, and packers to obfuscate code Implement effective intrusion detection and prevention procedures Defend against keylogging, redirect, click fraud, and identity theft threats Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploits Protect hosts using the latest antivirus, pop-up blocker, and firewall software Identify and terminate malicious processes using HIPS and NIPS. Codice libro della libreria AAC9780071591188

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 40,10
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

4.

Aaron LeMasters; Michael A. Davis; Sean M. Bodmer
Editore: McGraw-Hill Education (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
Nuovi Paperback Quantità: 1
Da
Irish Booksellers
(Rumford, ME, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education, 2009. Paperback. Condizione libro: New. book. Codice libro della libreria 0071591184

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 40,14
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi

5.

Michael A. Davis, Sean M. Bodmer, Jason Lord
Editore: McGraw-Hill Education - Europe, United States (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
Nuovi Paperback Quantità: 10
Da
The Book Depository US
(London, Regno Unito)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education - Europe, United States, 2009. Paperback. Condizione libro: New. 229 x 185 mm. Language: English . Brand New Book. A harrowing guide to where the bad guys hide, and how you can find them. --Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face. --From the Foreword by Lance Spitzner, President of the Honeynet Project Don t let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today s hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterprise Learn how hackers use archivers, encryptors, and packers to obfuscate code Implement effective intrusion detection and prevention procedures Defend against keylogging, redirect, click fraud, and identity theft threats Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploits Protect hosts using the latest antivirus, pop-up blocker, and firewall software Identify and terminate malicious processes using HIPS and NIPS. Codice libro della libreria AAC9780071591188

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 40,51
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

6.

Davis, Michael A.; Bodmer, Sean M.; LeMasters, Aaron
Editore: McGraw-Hill Education
ISBN 10: 0071591184 ISBN 13: 9780071591188
Nuovi PAPERBACK Quantità: > 20
Da
Movie Mars
(Matthews, NC, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education. PAPERBACK. Condizione libro: New. 0071591184 Brand New Book. Ships from the United States. 30 Day Satisfaction Guarantee!. Codice libro della libreria 4692108

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 36,94
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,71
In U.S.A.
Destinazione, tempi e costi

7.

Davis, Michael A.
Editore: McGraw-Hill Education (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
Nuovi Quantità: > 20
Da
PBShop
(Wood Dale, IL, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education, 2009. PAP. Condizione libro: New. New Book.Shipped from US within 10 to 14 business days. Established seller since 2000. Codice libro della libreria IB-9780071591188

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 36,95
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,71
In U.S.A.
Destinazione, tempi e costi

8.

Michael A Davis
ISBN 10: 0071591184 ISBN 13: 9780071591188
Nuovi Quantità: 5
Da
Chiron Media
(Wallingford, Regno Unito)
Valutazione libreria
[?]

Descrizione libro Condizione libro: New. Brand new book, sourced directly from publisher. Dispatch time is 24-48 hours from our warehouse. Book will be sent in robust, secure packaging to ensure it reaches you securely. Codice libro della libreria NU-ING-00279549

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 37,27
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,46
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi

9.

Davis, Michael A.
Editore: McGraw-Hill Education (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
Nuovi Paperback Quantità: 20
Da
Murray Media
(North Miami Beach, FL, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill Education, 2009. Paperback. Condizione libro: New. Codice libro della libreria 0071591184

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 39,00
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 2,78
In U.S.A.
Destinazione, tempi e costi

10.

Michael Davis
Editore: McGraw-Hill/Osborne Media
ISBN 10: 0071591184 ISBN 13: 9780071591188
Nuovi Paperback Quantità: 20
Da
BuySomeBooks
(Las Vegas, NV, U.S.A.)
Valutazione libreria
[?]

Descrizione libro McGraw-Hill/Osborne Media. Paperback. Condizione libro: New. Paperback. 400 pages. Dimensions: 9.0in. x 7.3in. x 0.9in.A harrowing guide to where the bad guys hide, and how you can find them. --Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face. --From the Foreword by Lance Spitzner, President of the Honeynet Project Dont let another machine become a zombie in the malware armyDefend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how todays hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterpriseLearn how hackers use archivers, encryptors, and packers to obfuscate codeImplement effective intrusion detection and prevention proceduresDefend against keylogging, redirect, click fraud, and identity theft threatsDetect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploitsProtect hosts using the latest antivirus, pop-up blocker, and firewall softwareIdentify and terminate malicious processes using HIPS and NIPS This item ships from multiple locations. Your book may arrive from Roseburg,OR, La Vergne,TN. Paperback. Codice libro della libreria 9780071591188

Maggiori informazioni su questa libreria | Fare una domanda alla libreria

Compra nuovo
EUR 39,35
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,67
In U.S.A.
Destinazione, tempi e costi

Vedi altre copie di questo libro

Vedi tutti i risultati per questo libro