Skip to main content

ISBN10: 0071823077 | ISBN13: 9780071823074

ISBN10: 0071823077
ISBN13: 9780071823074
By Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer and Aaron LeMasters

Step 1. Download Adobe Digital Editions to your PC or Mac desktop/laptop.

Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.

Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.

• Learn how malware infects, survives, and propagates across an enterprise
• See how hackers develop malicious code and target vulnerable systems
• Detect, neutralize, and remove user-mode and kernel-mode rootkits
• Use hypervisors and honeypots to uncover and kill virtual rootkits
• Defend against keylogging, redirect, click fraud, and identity theft
• Block spear phishing, client-side, and embedded-code exploits
• Effectively deploy the latest antivirus, pop-up blocker, and firewall software
• Identify and stop malicious processes using IPS solutions

Part 1: Malware
Chapter 1: Malware Propagation
Chapter 2: Malware Functionality

Part 2: Rootkits
Chapter 3: User-Mode Rootkits
Chapter 4: Kernel-Mode Rootkits
Chapter 5: Virtual Rootkits
Chapter 6: The Future of Rootkits

Part 3: Prevention Technologies
Chapter 7: Antivirus
Chapter 8: Host Protection Systems
Chapter 9: Host Based Intrusion Prevention
Chapter 10: Rootkit Detection
Chapter 11: General Security Practices

Part 4: Appendix
Appendix A: System Integrity Analysis: Building Your Own Rootkit Detector

Need support?   We're here to help - Get real-world support and resources every step of the way.

Top