My Account Log in

1 option

Hacking exposed malware and rootkits : security secrets & solutions / Christopher C. Elisan [and three others].

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Elisan, Christopher C., author.
Davis, Michael, author.
Bodmer, Sean, author.
LeMasters, Aaron, author.
Language:
English
Subjects (All):
Computer security.
Computer networks--Security measures.
Computer networks.
Malware (Computer software).
Rootkits (Computer software).
Physical Description:
1 online resource (1 volume) : illustrations
Edition:
Second edition.
Place of Publication:
New York : McGraw-Hill Education, [2017]
System Details:
text file
Summary:
Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology. • Learn how malware infects, survives, and propagates across an enterprise • See how hackers develop malicious code and target vulnerable systems • Detect, neutralize, and remove user-mode and kernel-mode rootkits • Use hypervisors and honeypots to uncover and kill virtual rootkits • Defend against keylogging, redirect, click fraud, and identity theft • Block spear phishing, client-side, and embedded-code exploits • Effectively deploy the latest antivirus, pop-up blocker, and firewall software • Identify and stop malicious processes using IPS solutions
Contents:
Malware propagation
Malware functionality
User-mode rootkits
Kernell-mode rootkits
Virtual rootkits
The future of rootkits
Antivirus
Host protection systems
Host-based intrusion prevention
Rootkit detection
General Security practices.
Notes:
Includes index.
Description based on print version record.
ISBN:
9780071825757
0071825754
OCLC:
968714981

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account