"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case ...
Read More
"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterprise Learn how hackers use archivers, encryptors, and packers to obfuscate code Implement effective intrusion detection and prevention procedures Defend against keylogging, redirect, click fraud, and identity theft threats Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploits Protect hosts using the latest antivirus, pop-up blocker, and firewall software Identify and terminate malicious processes using HIPS and NIPS
Read Less
Add this copy of Hacking Exposed: Malware & Rootkits Secrets & Solutions to cart. $3.00, very good condition, Sold by Bookoutlet rated 5.0 out of 5 stars, ships from Bridgeton, NJ, UNITED STATES, published 2009 by McGraw-Hill/Osborne Media.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very good. Ships Within 24 Hours M-F-Satisfaction Guaranteed! Has a publisher overstock mark. Item is in Good Condition. Clean Copy With Light Amount of Wear.
Add this copy of Hacking Exposed Malware & Rootkits: Malware & Rootkits to cart. $3.98, very good condition, Sold by ThriftBooks-Dallas rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 2009 by McGraw-Hill/Osborne Media.
Add this copy of Hacking Exposed Malware & Rootkits: Malware & Rootkits to cart. $3.98, very good condition, Sold by ThriftBooks-Baltimore rated 4.0 out of 5 stars, ships from Halethorpe, MD, UNITED STATES, published 2009 by McGraw-Hill/Osborne Media.
Add this copy of Hacking Exposed: Malware & Rootkits Secrets & Solutions to cart. $4.00, good condition, Sold by HPB-Red rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 2009 by McGraw-Hill Education.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Add this copy of Hacking Exposed: Malware & Rootkits Secrets & Solutions to cart. $5.00, good condition, Sold by HPB-Red rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 2009 by McGraw-Hill Education.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Add this copy of Hacking Exposed Malware and Rootkits: Malware and to cart. $18.98, very good condition, Sold by Brit Books rated 4.0 out of 5 stars, ships from Milton Keynes, BUCKINGHAMSHIRE, UNITED KINGDOM, published 2009 by McGraw-Hill Osborne.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very good. Simply Brit – welcome to our online used book store, where affordability meets great quality. Dive into a world of captivating reads without breaking the bank. We take pride in offering a wide selection of used books, from classics to hidden gems, ensuring there's something for every literary palate. All orders are shipped within 24 hours and our lightning fast-delivery within 48 hours coupled with our prompt customer service ensures a smooth journey from ordering to delivery. Discover the joy of reading with us, your trusted source for affordable books that do not compromise on quality.
Add this copy of Hacking Exposed: Malware & Rootkits Secrets & Solutions to cart. $32.50, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Hialeah, FL, UNITED STATES, published 2009 by McGraw-Hill Education.
Add this copy of Hacking Exposed: Malware & Rootkits Secrets & Solutions to cart. $42.32, new condition, Sold by discount_scientific_books rated 5.0 out of 5 stars, ships from Sterling Heights, MI, UNITED STATES, published 2009 by McGraw-Hill/Osborne Media.
Add this copy of Hacking Exposed: Malware & Rootkits Secrets & Solutions to cart. $46.38, new condition, Sold by discount_scientific_books rated 5.0 out of 5 stars, ships from Sterling Heights, MI, UNITED STATES, published 2009 by McGraw-Hill/Osborne Media.