Hacking Exposed: Malware & Rootkits Secrets & Solutions

4.13 avg rating
( 39 ratings by GoodReads )
 
9780071591188: Hacking Exposed: Malware & Rootkits Secrets & Solutions

"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive

"An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project

Don't let another machine become a zombie in the malware army

Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.

  • Understand how malware infects, survives, and propagates across an enterprise
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Implement effective intrusion detection and prevention procedures
  • Defend against keylogging, redirect, click fraud, and identity theft threats
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Prevent malicious website, phishing, client-side, and embedded-code exploits
  • Protect hosts using the latest antivirus, pop-up blocker, and firewall software
  • Identify and terminate malicious processes using HIPS and NIPS

"synopsis" may belong to another edition of this title.

About the Author:

Michael A. Davis is CEO of Savid Technologies, Inc., a technology and security consulting firm. He has worked with McAfee, Inc., as senior manager of Global Threats. Michael is a member of the Honeynet Project.

Sean M. Bodmer is director of government programs at Savid Corporation, Inc. He is an active honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Sean works with the Honeynet Project and the Hacker Profiling Project.

Aaron LeMasters is a security researcher specializing in computer forensics, malware analysis, and vulnerability research. He spent five years defending the undefendable DoD networks and is now a senior software engineer at Raytheon SI.

"About this title" may belong to another edition of this title.

Top Search Results from the AbeBooks Marketplace

1.

Aaron LeMasters; Michael A. Davis; Sean M. Bodmer
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback Quantity Available: > 20
Seller
BargainBookStores
(Grand Rapids, MI, U.S.A.)
Rating
[?]

Book Description Paperback. Book Condition: New. Bookseller Inventory # 1707178

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 36.13
Convert Currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, Rates & Speeds

2.

Aaron LeMasters; Michael A. Davis; Sean M. Bodmer
Published by McGraw-Hill Education - Europe, United States (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback Quantity Available: 10
Seller
The Book Depository US
(London, United Kingdom)
Rating
[?]

Book Description McGraw-Hill Education - Europe, United States, 2009. Paperback. Book Condition: New. 229 x 185 mm. Language: English . Brand New Book. A harrowing guide to where the bad guys hide, and how you can find them. --Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face. --From the Foreword by Lance Spitzner, President of the Honeynet Project Don t let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today s hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterprise Learn how hackers use archivers, encryptors, and packers to obfuscate code Implement effective intrusion detection and prevention procedures Defend against keylogging, redirect, click fraud, and identity theft threats Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploits Protect hosts using the latest antivirus, pop-up blocker, and firewall software Identify and terminate malicious processes using HIPS and NIPS. Bookseller Inventory # AAC9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 42.26
Convert Currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, Rates & Speeds

3.

Aaron LeMasters; Michael A. Davis; Sean M. Bodmer
Published by McGraw-Hill Education
ISBN 10: 0071591184 ISBN 13: 9780071591188
New PAPERBACK Quantity Available: > 20
Seller
Movie Mars
(Indian Trail, NC, U.S.A.)
Rating
[?]

Book Description McGraw-Hill Education. PAPERBACK. Book Condition: New. 0071591184 Brand New Book. Ships from the United States. 30 Day Satisfaction Guarantee!. Bookseller Inventory # 4692108

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 38.58
Convert Currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, Rates & Speeds

4.

Aaron LeMasters; Michael A. Davis; Sean M. Bodmer
Published by McGraw-Hill Education (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Quantity Available: > 20
Seller
PBShop
(Wood Dale, IL, U.S.A.)
Rating
[?]

Book Description McGraw-Hill Education, 2009. PAP. Book Condition: New. New Book.Shipped from US within 10 to 14 business days. Established seller since 2000. Bookseller Inventory # IB-9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 38.59
Convert Currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, Rates & Speeds

5.

Aaron LeMasters; Michael A. Davis; Sean M. Bodmer
Published by McGraw-Hill Education - Europe, United States (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback Quantity Available: 10
Seller
The Book Depository
(London, United Kingdom)
Rating
[?]

Book Description McGraw-Hill Education - Europe, United States, 2009. Paperback. Book Condition: New. 229 x 185 mm. Language: English . Brand New Book. A harrowing guide to where the bad guys hide, and how you can find them. --Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face. --From the Foreword by Lance Spitzner, President of the Honeynet Project Don t let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today s hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterprise Learn how hackers use archivers, encryptors, and packers to obfuscate code Implement effective intrusion detection and prevention procedures Defend against keylogging, redirect, click fraud, and identity theft threats Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploits Protect hosts using the latest antivirus, pop-up blocker, and firewall software Identify and terminate malicious processes using HIPS and NIPS. Bookseller Inventory # AAC9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 43.47
Convert Currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, Rates & Speeds

6.

Aaron LeMasters; Michael A. Davis; Sean M. Bodmer
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Quantity Available: 5
Seller
Chiron Media
(Wallingford, United Kingdom)
Rating
[?]

Book Description Book Condition: New. Brand new book, sourced directly from publisher. Dispatch time is 24-48 hours from our warehouse. Book will be sent in robust, secure packaging to ensure it reaches you securely. Bookseller Inventory # NU-ING-00279549

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 40.14
Convert Currency

Add to Basket

Shipping: US$ 3.72
From United Kingdom to U.S.A.
Destination, Rates & Speeds

7.

Aaron LeMasters; Michael A. Davis; Sean M. Bodmer
Published by McGraw-Hill/Osborne Media
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback Quantity Available: 20
Seller
BuySomeBooks
(Las Vegas, NV, U.S.A.)
Rating
[?]

Book Description McGraw-Hill/Osborne Media. Paperback. Book Condition: New. Paperback. 400 pages. Dimensions: 9.0in. x 7.3in. x 0.9in.A harrowing guide to where the bad guys hide, and how you can find them. --Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face. --From the Foreword by Lance Spitzner, President of the Honeynet Project Dont let another machine become a zombie in the malware armyDefend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how todays hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterpriseLearn how hackers use archivers, encryptors, and packers to obfuscate codeImplement effective intrusion detection and prevention proceduresDefend against keylogging, redirect, click fraud, and identity theft threatsDetect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploitsProtect hosts using the latest antivirus, pop-up blocker, and firewall softwareIdentify and terminate malicious processes using HIPS and NIPS This item ships from multiple locations. Your book may arrive from Roseburg,OR, La Vergne,TN. Paperback. Bookseller Inventory # 9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 41.10
Convert Currency

Add to Basket

Shipping: US$ 3.95
Within U.S.A.
Destination, Rates & Speeds

8.

Aaron LeMasters; Michael A. Davis; Sean M. Bodmer
Published by McGraw-Hill Education
ISBN 10: 0071591184 ISBN 13: 9780071591188
New PAPERBACK Quantity Available: 1
Seller
Vital Products COM LLC
(southampton, PA, U.S.A.)
Rating
[?]

Book Description McGraw-Hill Education. PAPERBACK. Book Condition: New. 0071591184. Bookseller Inventory # Z0071591184ZN

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 47.05
Convert Currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, Rates & Speeds

9.

Aaron LeMasters; Michael A. Davis; Sean M. Bodmer
Published by McGraw-Hill Education (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback Quantity Available: 10
Seller
Ergodebooks
(RICHMOND, TX, U.S.A.)
Rating
[?]

Book Description McGraw-Hill Education, 2009. Paperback. Book Condition: New. Bookseller Inventory # INGM9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 43.26
Convert Currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, Rates & Speeds

10.

Aaron LeMasters; Michael A. Davis; Sean M. Bodmer
Published by McGraw-Hill Education (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Quantity Available: > 20
Seller
Books2Anywhere
(Fairford, GLOS, United Kingdom)
Rating
[?]

Book Description McGraw-Hill Education, 2009. PAP. Book Condition: New. New Book. Shipped from US within 10 to 14 business days. Established seller since 2000. Bookseller Inventory # IB-9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 36.38
Convert Currency

Add to Basket

Shipping: US$ 11.21
From United Kingdom to U.S.A.
Destination, Rates & Speeds

There are more copies of this book

View all search results for this book