Start reading HACKING EXPOSED MALWARE AND ROOTKITS: Malware & Rootkits... on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here or start reading now with a free Kindle Reading App.

Deliver to your Kindle or other device

 
 
 

Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.
HACKING EXPOSED MALWARE AND ROOTKITS: Malware & Rootkits Secrets & Solutions (eb)
 
 

HACKING EXPOSED MALWARE AND ROOTKITS: Malware & Rootkits Secrets & Solutions (eb) [Kindle Edition]

Aaron LeMasters , Michael Davis , Sean Bodmer
5.0 out of 5 stars  See all reviews (1 customer review)

Kindle Price: £24.97 includes VAT* & free wireless delivery via Amazon Whispernet
* Unlike print books, digital books are subject to VAT.

Kindle Daily Deal
Kindle Daily Deal: At least 60% off
Each day we unveil a new book deal at a specially discounted price--for that day only. Learn more about the Kindle Daily Deal or sign up for the Kindle Daily Deal Newsletter to receive free e-mail notifications about each day's deal.


Product Description

Product Description

"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive

"An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project

Don't let another machine become a zombie in the malware army

Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.

  • Understand how malware infects, survives, and propagates across an enterprise
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Implement effective intrusion detection and prevention procedures
  • Defend against keylogging, redirect, click fraud, and identity theft threats
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Prevent malicious website, phishing, client-side, and embedded-code exploits
  • Protect hosts using the latest antivirus, pop-up blocker, and firewall software
  • Identify and terminate malicious processes using HIPS and NIPS

Product details

  • Format: Kindle Edition
  • File Size: 4201 KB
  • Print Length: 400 pages
  • Simultaneous Device Usage: Up to 4 simultaneous devices, per publisher limits
  • Publisher: McGraw-Hill Osborne Media; 1 edition (23 Sep 2009)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B0015DPX9O
  • Text-to-Speech: Enabled
  • X-Ray:
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: #464,440 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?


More About the Author

Discover books, learn about writers, and more.

Customer Reviews

4 star
0
3 star
0
2 star
0
1 star
0
5.0 out of 5 stars
5.0 out of 5 stars
Most Helpful Customer Reviews
5.0 out of 5 stars Good read 6 Mar 2013
Format:Kindle Edition|Verified Purchase
A nice addition to the other books in the series, I recommend you get the main hacking exposed books before you buy the additions as they may provide you already with what you need. This is really further reading and specific.
Comment | 
Was this review helpful to you?
Search Customer Reviews
Only search this product's reviews

Popular Highlights

 (What's this?)
&quote;
The most powerful part of using a packer is the malware never needs to hit the hard disk. Everything is run as in-process memory, which can generally bypass most antivirus and host-based security tools. &quote;
Highlighted by 4 Kindle users
&quote;
Malware authors want money, and the easiest way to get it is to steal it from you. &quote;
Highlighted by 3 Kindle users
&quote;
lure visitors to a copy of a known site that is loaded with multiple injection points where visitors can click and then become infected with malware. &quote;
Highlighted by 3 Kindle users

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category