• RRP: £41.99
  • You Save: £7.00 (17%)
FREE Delivery in the UK.
Only 1 left in stock (more on the way).
Dispatched from and sold by Amazon.
Gift-wrap available.
HACKING EXPOSED MALWARE A... has been added to your Basket
+ £2.80 UK delivery
Used: Good | Details
Condition: Used: Good
Comment: Expedited shipping available on this book. The book has been read but remains in clean condition. All pages are intact and the cover is intact. Some minor wear to the spine.
Trade in your item
Get a £3.29
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

HACKING EXPOSED MALWARE AND ROOTKITS: Malware and Rootkits Secrets and Solutions Paperback – 1 Nov 2009

1 customer review

See all formats and editions Hide other formats and editions
Amazon Price New from Used from
"Please retry"
£21.75 £3.52

There is a newer edition of this item:

£34.99 FREE Delivery in the UK. Only 1 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.

Special Offers and Product Promotions

  • Win a £5,000 Amazon.co.uk Gift Card for your child's school by voting for their favourite book. Learn more.
  • Prepare for the summer with our pick of the best selection for children (ages 0 - 12) across Amazon.co.uk.

Frequently Bought Together

HACKING EXPOSED MALWARE AND ROOTKITS: Malware and Rootkits Secrets and Solutions + Hacking Exposed 7: Network Security Secrets and Solutions
Price For Both: £58.10

Buy the selected items together

Win a £5,000 Amazon.co.uk Gift Card and 30 Kindle E-readers for your child or pupil's school.
Vote for your child or pupil(s) favourite book(s) here to be in with a chance to win.

Product details

  • Paperback: 400 pages
  • Publisher: McGraw-Hill Osborne (1 Nov. 2009)
  • Language: English
  • ISBN-10: 0071591184
  • ISBN-13: 978-0071591188
  • Product Dimensions: 19 x 2 x 23.4 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 339,500 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Authors

Discover books, learn about writers, and more.

Product Description

About the Author

Michael A. Davis is CEO of Savid Technologies, Inc., a technology and security consulting firm. He has worked with McAfee, Inc., as senior manager of Global Threats. Michael is a member of the Honeynet Project.

Sean M. Bodmer is director of government programs at Savid Corporation, Inc. He is an active honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Sean works with the Honeynet Project and the Hacker Profiling Project.

Aaron LeMasters is a security researcher specializing in computer forensics, malware analysis, and vulnerability research. He spent five years defending the undefendable DoD networks and is now a senior software engineer at Raytheon SI.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

5.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See the customer review
Share your thoughts with other customers

Most Helpful Customer Reviews

3 of 3 people found the following review helpful By N. Williams on 29 April 2010
Format: Paperback
I was expecting an informative book covering various malware and what they do, methods of infection etc, bit like a library of viruses I suppose.

What I got was a scary book that explains the principles on which viruses and rootkits are built, some sample code for very old malware objects so you can follow the more technical bits as well as methods of protection, detection and best advise.

This was an amazing read by people who obviously know the subject inside out. I was totally impressed by this book and think it is an essential addition to anyone interested in malware and by extension security.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 10 reviews
11 of 13 people found the following review helpful
The new breed of crackers... 23 Dec. 2009
By William Scarbrough - Published on Amazon.com
Format: Paperback
While the first reviewer didn't like the emphasis on Rootkits as opposed to also including more info on Malware, there are already plenty of books concerning Malware in my opinion.
The delivery mechanism (Rootkits) seems to be less exposed and known about in the general public.

This book deals more with actually locating, and removing Rootkits (within reason) where as many of the recently published Rootkit guides deal more with implementation and structuring of Rootkits.
For the above average computer user as well as IT professional, I would highly recommend this book. It's not written in laymans terms but even someone who is an avid computer user could pick up many useful tips from this read. If you have any dreams of getting into the computer security field or if you do computer security on the side, this is an absolute must have for your library.
The newest generation of crackers and black hats are quickly moving to the Rootkit delivery system because of it's totally stealth characteristics and fast deployment system rendering todays AV and Anti-Malware programs virtually useless to protect the end user.

Personally I'd recommend everyone get or read this book since Rootkits ARE the wave of the future without a doubt.
5 of 5 people found the following review helpful
Filled in the Gaps 23 Nov. 2010
By EarthMother - Published on Amazon.com
Format: Paperback
Well, I am a "layperson" and found an abundance of interesting and informative material in this well written manual. A close relative works in the cyber security industry so I wanted to become conversant in the language and concepts of his day-to-day mission. Although some of the terms were "above my pay grade," I understood the material and learned far more than I ever have after reading online overviews of the same topics. I especially appreciated the chapters on anti-virus and host detections systems that explain the dynamic nature of the antivirus industry and ongoing programs designed to combat ever growing malicious threats. Our increasing dependence on computers dictate that we become more knowledgable about detecting malware, etc. This book certainly helped me undertand what I need to know and do to protect my computers!
1 of 1 people found the following review helpful
Threat from cyberspace 24 April 2013
By Yit-Koi Lam - Published on Amazon.com
Format: Paperback Verified Purchase
Well written. Thoroughly researched by technology security professionals. For those who needed to protect their computers and data systems, this is a good resource book to keep by our side. Stay alert. Do not execute your mails blindly. Threats comes by the moment you power up your computer.
A great read with good ideas! 13 Oct. 2010
By John Smith - Published on Amazon.com
Format: Paperback
This book is succinct, yet detailed. It addresses the real-time emerging threat of not only malware and rootkits, but the individuals behind the development and deployment of them. They do a very good job of discussing possible countermeasures in each chapter which focus on specific issues and offer the common sense solutions which and IT professional should have no problem implementing. A friend recommended this to me, and I am glad he did!
By drake - Published on Amazon.com
Format: Paperback Verified Purchase
I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.

They are Great Books!! ---That is my opinion!
Were these reviews helpful? Let us know