Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.

Hacking Exposed Malware & Rootkits

ebook

Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.

  • Learn how malware infects, survives, and propagates across an enterprise
  • See how hackers develop malicious code and target vulnerable systems
  • Detect, neutralize, and remove user-mode and kernel-mode rootkits
  • Use hypervisors and honeypots to uncover and kill virtual rootkits
  • Defend against keylogging, redirect, click fraud, and identity theft
  • Block spear phishing, client-side, and embedded-code exploits
  • Effectively deploy the latest antivirus, pop-up blocker, and firewall software
  • Identify and stop malicious processes using IPS solutions


  • Expand title description text
    Series: Hacking Exposed Publisher: McGraw Hill LLC Edition: 2

    Kindle Book

    • Release date: December 16, 2016

    OverDrive Read

    • ISBN: 9780071825757
    • File size: 22422 KB
    • Release date: December 16, 2016

    EPUB ebook

    • ISBN: 9780071825757
    • File size: 22422 KB
    • Release date: December 16, 2016

    Formats

    Kindle Book
    OverDrive Read
    EPUB ebook

    Languages

    English

    Arm yourself for the escalating war against malware and rootkits

    Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.

  • Learn how malware infects, survives, and propagates across an enterprise
  • See how hackers develop malicious code and target vulnerable systems
  • Detect, neutralize, and remove user-mode and kernel-mode rootkits
  • Use hypervisors and honeypots to uncover and kill virtual rootkits
  • Defend against keylogging, redirect, click fraud, and identity theft
  • Block spear phishing, client-side, and embedded-code exploits
  • Effectively deploy the latest antivirus, pop-up blocker, and firewall software
  • Identify and stop malicious processes using IPS solutions


  • Expand title description text