Hacking exposed : malware and rootkits : security secrets & solutions /
Elisan, Christopher C.
Hacking exposed : malware and rootkits : security secrets & solutions / Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters - 2nd - New York : McGraw-Hill Education, 2017 - xxii, 360 pages : illustrations ; 24 cm
Revised edition of: Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters. 2010
Includes index Part I : Malware. Malware propagation -- Malware functionality -- Part II : Rootkits. User-mode rootkits -- Kernel-mode rootkits -- Virtual rootkits -- The future of rootkits -- Part III : Prevention technologies. Antivirus -- Host protection systems -- Host-based intrusion prevention -- Rootkit detection -- General security practices
"Fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop -up and phising exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology."--Back cover
9780071823074 9780071823074 020 0071823077
Computer security
650 0 Computer networks|xSecurity measures 650 0 Malware (Computer software) 650 0 Rootkits (Computer software)
QA76.9.A25 / E39 2017
Hacking exposed : malware and rootkits : security secrets & solutions / Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters - 2nd - New York : McGraw-Hill Education, 2017 - xxii, 360 pages : illustrations ; 24 cm
Revised edition of: Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters. 2010
Includes index Part I : Malware. Malware propagation -- Malware functionality -- Part II : Rootkits. User-mode rootkits -- Kernel-mode rootkits -- Virtual rootkits -- The future of rootkits -- Part III : Prevention technologies. Antivirus -- Host protection systems -- Host-based intrusion prevention -- Rootkit detection -- General security practices
"Fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop -up and phising exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology."--Back cover
9780071823074 9780071823074 020 0071823077
Computer security
650 0 Computer networks|xSecurity measures 650 0 Malware (Computer software) 650 0 Rootkits (Computer software)
QA76.9.A25 / E39 2017