did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

9780071823074

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

  • ISBN 13:

    9780071823074

  • ISBN 10:

    0071823077

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 12/30/2016
  • Publisher: McGraw Hill
Sorry, this item is currently unavailable on Knetbooks.com

List Price $60.00 Save $2.09

New $57.91

Usually Ships in 2-3 Business Days

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware

Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail.

  • Counter today’s most virulent network attack types
  • Find out how malware infects, survives, and propagates across an enterprise
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Defend against keylogging, redirect, click fraud, and identity theft threats

Table of Contents

Read more