Malware: Fighting Malicious Code

 
9780131014053: Malware: Fighting Malicious Code
View all copies of this ISBN edition:
 
 

Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jumpingoff point to spread to all of your buddies' computers; and steal files from your machine. Malicious code in the hands of a crafty attacker is indeed powerful. It's becoming even more of a problem because many of the very same factors fueling the evolution of the computer industry are making our systems even more vulnerable to malicious code. Specifically, malicious code writers benefit from the trends toward mixing static data and executable instructions, increasingly homogenous computing environments, unprecedented connectivity, an ever-larger clueless user base, and an unfriendly world. Skoudis addressed malicious code in just one chapter of his previous book. Here, a dozen chapters focus on one of the most interesting and rapidly developing areas of computer attacks. *Chapter 11, "Defender's Toolbox," rolls together the defensive strategies described in the book. As a bonus, Skoudis gives recipes for creating your own malicious code analysis laboratory using cheap hardware and software. *Foreword by Gene Schultz, security inspector for Global Integrity.

"synopsis" may belong to another edition of this title.

From the Back Cover:

  • Reveals how attackers install malicious code and how they evade detection
  • Shows how you can defeat their schemes and keep your computers and network safe!
  • Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats
  • Explains how to handle today's threats, with an eye on handling the threats to come

"This is a truly outstanding book-enormous technical wealth and beautifully written."
—Warwick Ford

"Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!"
—Harlan Carvey, CISSP

"This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle."
—Radia Perlman, Distinguished Engineer, Sun Microsystems

Keep control of your systems out of the hands of unknown attackers

Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it!

This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes:

  • Solutions and examples that cover both UNIX® and Windows®
  • Practical, time-tested, real-world actions you can take to secure your systems
  • Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly!

Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home computer users, and anyone else interested in keeping their systems safe from attackers.

About the Author:

ED SKOUDIS is a computer security consultant with International Network Services. Ed's expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed secure network architectures, and responded to computer attacks. A frequent speaker on issues associated with hacker tools and effective defenses, Ed has published several articles, as well as the highly acclaimed Counter Attack: A Step-by-Step Guide to Computer Attacks and Effective Defenses (Prentice Hall PTR, 2001).

"About this title" may belong to another edition of this title.

Other Popular Editions of the Same Title

9780536915030: Malware: Fighting Malicious Code

Featured Edition

ISBN 10:  0536915032 ISBN 13:  9780536915030
Publisher: Prentice Hall Ptr, 2005
Softcover

Top Search Results from the AbeBooks Marketplace

1.

Skoudis, Ed
Published by Prentice Hall PTR
ISBN 10: 0131014056 ISBN 13: 9780131014053
New Quantity Available: 11
Seller:
TextbookRush
(Grandview Heights, OH, U.S.A.)
Rating
[?]

Book Description Prentice Hall PTR. Condition: Brand New. Ships SAME or NEXT business day. We Ship to APO/FPO addr. Choose EXPEDITED shipping and receive in 2-5 business days within the United States. See our member profile for customer support contact info. We have an easy return policy. Seller Inventory # 44970357

More information about this seller | Contact this seller

Buy New
US$ 27.21
Convert currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, rates & speeds

2.

Ed Skoudis, Lenny Zeltser
Published by Prentice Hall (2003)
ISBN 10: 0131014056 ISBN 13: 9780131014053
New Paperback Quantity Available: 1
Seller:
Ergodebooks
(RICHMOND, TX, U.S.A.)
Rating
[?]

Book Description Prentice Hall, 2003. Paperback. Condition: New. Seller Inventory # DADAX0131014056

More information about this seller | Contact this seller

Buy New
US$ 34.66
Convert currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, rates & speeds

3.

Skoudis, Ed
ISBN 10: 0131014056 ISBN 13: 9780131014053
New Quantity Available: 1
Seller:
Paperbackshop-US
(Wood Dale, IL, U.S.A.)
Rating
[?]

Book Description 2003. PAP. Condition: New. New Book. Shipped from US within 10 to 14 business days. Established seller since 2000. Seller Inventory # KB-9780131014053

More information about this seller | Contact this seller

Buy New
US$ 39.96
Convert currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, rates & speeds

4.

Skoudis, EdZeltser, Lenny
Published by Prentice Hall
ISBN 10: 0131014056 ISBN 13: 9780131014053
New Quantity Available: 5
Seller:
INDOO
(Avenel, NJ, U.S.A.)
Rating
[?]

Book Description Prentice Hall. Condition: New. Brand New. Seller Inventory # 0131014056

More information about this seller | Contact this seller

Buy New
US$ 40.48
Convert currency

Add to Basket

Shipping: US$ 3.60
Within U.S.A.
Destination, rates & speeds

5.

Ed Skoudis, Lenny Zeltser
Published by Pearson Education (US), United States (2003)
ISBN 10: 0131014056 ISBN 13: 9780131014053
New Paperback Quantity Available: 1
Seller:
Book Depository International
(London, United Kingdom)
Rating
[?]

Book Description Pearson Education (US), United States, 2003. Paperback. Condition: New. New. Language: English. Brand new Book. Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jumping-off point to spread to all of your buddies' computers; and steal files from your machine. Malicious code in the hands of a crafty attacker is indeed powerful. It's becoming even more of a problem because many of the very same factors fueling the evolution of the computer industry are making our systems even more vulnerable to malicious code. Specifically, malicious code writers benefit from the trends toward mixing static data and executable instructions, increasingly homogenous computing environments, unprecedented connectivity, an ever-larger clueless user base, and an unfriendly world. Skoudis addressed malicious code in just one chapter of his previous book. Here, a dozen chapters focus on one of the most interesting and rapidly developing areas of computer attacks.*Chapter 11, "Defender's Toolbox," rolls together the defensive strategies described in the book. As a bonus, Skoudis gives recipes for creating your own malicious code analysis laboratory using cheap hardware and software. Seller Inventory # AAS9780131014053

More information about this seller | Contact this seller

Buy New
US$ 56.59
Convert currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, rates & speeds

6.

Ed Skoudis, Lenny Zeltser
Published by Pearson Education (US), United States (2003)
ISBN 10: 0131014056 ISBN 13: 9780131014053
New Paperback Quantity Available: 1
Seller:
The Book Depository
(London, United Kingdom)
Rating
[?]

Book Description Pearson Education (US), United States, 2003. Paperback. Condition: New. New. Language: English. Brand new Book. Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jumping-off point to spread to all of your buddies' computers; and steal files from your machine. Malicious code in the hands of a crafty attacker is indeed powerful. It's becoming even more of a problem because many of the very same factors fueling the evolution of the computer industry are making our systems even more vulnerable to malicious code. Specifically, malicious code writers benefit from the trends toward mixing static data and executable instructions, increasingly homogenous computing environments, unprecedented connectivity, an ever-larger clueless user base, and an unfriendly world. Skoudis addressed malicious code in just one chapter of his previous book. Here, a dozen chapters focus on one of the most interesting and rapidly developing areas of computer attacks.*Chapter 11, "Defender's Toolbox," rolls together the defensive strategies described in the book. As a bonus, Skoudis gives recipes for creating your own malicious code analysis laboratory using cheap hardware and software. Seller Inventory # AAS9780131014053

More information about this seller | Contact this seller

Buy New
US$ 58.40
Convert currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, rates & speeds

7.

Ed Skoudis
Published by Pearson Education (US)
ISBN 10: 0131014056 ISBN 13: 9780131014053
New Paperback / softback Quantity Available: 4
Seller:
THE SAINT BOOKSTORE
(Southport, United Kingdom)
Rating
[?]

Book Description Pearson Education (US). Paperback / softback. Condition: New. New copy - Usually dispatched within 2 working days. Seller Inventory # B9780131014053

More information about this seller | Contact this seller

Buy New
US$ 50.36
Convert currency

Add to Basket

Shipping: US$ 8.92
From United Kingdom to U.S.A.
Destination, rates & speeds

8.

Ed Skoudis, Lenny Zeltser
Published by Pearson Education (US), United States (2003)
ISBN 10: 0131014056 ISBN 13: 9780131014053
New Paperback Quantity Available: 10
Seller:
Book Depository hard to find
(London, United Kingdom)
Rating
[?]

Book Description Pearson Education (US), United States, 2003. Paperback. Condition: New. New. Language: English. Brand new Book. Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jumping-off point to spread to all of your buddies' computers; and steal files from your machine. Malicious code in the hands of a crafty attacker is indeed powerful. It's becoming even more of a problem because many of the very same factors fueling the evolution of the computer industry are making our systems even more vulnerable to malicious code. Specifically, malicious code writers benefit from the trends toward mixing static data and executable instructions, increasingly homogenous computing environments, unprecedented connectivity, an ever-larger clueless user base, and an unfriendly world. Skoudis addressed malicious code in just one chapter of his previous book. Here, a dozen chapters focus on one of the most interesting and rapidly developing areas of computer attacks.*Chapter 11, "Defender's Toolbox," rolls together the defensive strategies described in the book. As a bonus, Skoudis gives recipes for creating your own malicious code analysis laboratory using cheap hardware and software. Seller Inventory # BTE9780131014053

More information about this seller | Contact this seller

Buy New
US$ 62.81
Convert currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, rates & speeds

9.

Ed Skoudis; Lenny Zeltser
Published by Prentice Hall (2003)
ISBN 10: 0131014056 ISBN 13: 9780131014053
New Softcover Quantity Available: 1
Seller:
Irish Booksellers
(Portland, ME, U.S.A.)
Rating
[?]

Book Description Prentice Hall, 2003. Condition: New. book. Seller Inventory # M0131014056

More information about this seller | Contact this seller

Buy New
US$ 62.79
Convert currency

Add to Basket

Shipping: US$ 3.27
Within U.S.A.
Destination, rates & speeds

10.

Ed Skoudis; Lenny Zeltser
Published by Prentice Hall (2003)
ISBN 10: 0131014056 ISBN 13: 9780131014053
New Softcover Quantity Available: 3
Seller:
Rating
[?]

Book Description Prentice Hall, 2003. Condition: New. Seller Inventory # TV9780131014053

More information about this seller | Contact this seller

Buy New
US$ 63.36
Convert currency

Add to Basket

Shipping: US$ 3.20
From Germany to U.S.A.
Destination, rates & speeds

There are more copies of this book

View all search results for this book