FREE SHIPPING BOTH WAYS
ON EVERY ORDER!
LIST PRICE:
$60.00

Sorry, this item is currently unavailable.

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

ISBN: 9780071823074 | 0071823077
Edition: 2nd
Format: Paperback
Publisher: McGraw-Hill Education
Pub. Date: 1/6/2017

Why Rent from Knetbooks?

Because Knetbooks knows college students. Our rental program is designed to save you time and money. Whether you need a textbook for a semester, quarter or even a summer session, we have an option for you. Simply select a rental period, enter your information and your book will be on its way!

Top 5 reasons to order all your textbooks from Knetbooks:

  • We have the lowest prices on thousands of popular textbooks
  • Free shipping both ways on ALL orders
  • Most orders ship within 48 hours
  • Need your book longer than expected? Extending your rental is simple
  • Our customer support team is always here to help

The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware

Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail.

  • Counter today’s most virulent network attack types
  • Find out how malware infects, survives, and propagates across an enterprise
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Defend against keylogging, redirect, click fraud, and identity theft threats

Related Products


  • Hacking Exposed Malware And Rootkits
    Hacking Exposed Malware And Ro...


Please wait while this item is added to your cart...