HACKING EXPOSED MALWARE AND ROOTKITS / Edition 1

HACKING EXPOSED MALWARE AND ROOTKITS / Edition 1

1.0 1
by Michael Davis, Sean Bodmer, Aaron LeMasters
     
 

"A harrowing guide to where the bad guys hide, and how you can find them." —Dan Kaminsky, Director of Penetration Testing, IOActive

"An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." —From the Foreword by Lance Spitzner, President of the Honeynet Project

See more details below

Overview

"A harrowing guide to where the bad guys hide, and how you can find them." —Dan Kaminsky, Director of Penetration Testing, IOActive

"An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." —From the Foreword by Lance Spitzner, President of the Honeynet Project

Don't let another machine become a zombie in the malware army

Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.

  • Understand how malware infects, survives, and propagates across an enterprise
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Implement effective intrusion detection and prevention procedures
  • Defend against keylogging, redirect, click fraud, and identity theft threats
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Prevent malicious website, phishing, client-side, and embedded-code exploits
  • Protect hosts using the latest antivirus, pop-up blocker, and firewall software
  • Identify and terminate malicious processes using HIPS and NIPS

Read More

Product Details

ISBN-13:
9780071591188
Publisher:
McGraw-Hill Professional Publishing
Publication date:
09/23/2009
Series:
Hacking Exposed Series
Pages:
400
Sales rank:
727,580
Product dimensions:
7.30(w) x 9.00(h) x 0.90(d)

Table of Contents

Part I Malware

Case Study: Please Review This Before Our Quarterly Meeting

Chapter 1 Method of Infection

Chapter 2 Malware Functionality

Part II Rootkits

Case Study: The Invisible Rootkit That Steals Your Bank Account Data

Chapter 3 User-Mode Rootkits

Chapter 4 Kernel-Mode Rootkits

Chapter 5 Virtual Rootkits

Chapter 6 The Future of Rootkits: If You Think It's Bad Now

Part III Prevention Technologies

Case Study: A Wolf In Sheep's Clothing

Chapter 7 Antivirus

Chapter 8 Host Protection Systems

Chapter 9 Host-Based Intrusion Prevention

Chapter 10 Rootkit Detection

Chapter 11 General Security Practices

Appendix A System Integrity Analysis: Building Your Own Rootkit Detector

Index

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >