Hacking Exposed: Malware & Rootkits Secrets & Solutions

4.13 avg rating
( 39 ratings by Goodreads )
 
9780071591188: Hacking Exposed: Malware & Rootkits Secrets & Solutions

"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive

"An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project

Don't let another machine become a zombie in the malware army

Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.

  • Understand how malware infects, survives, and propagates across an enterprise
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Implement effective intrusion detection and prevention procedures
  • Defend against keylogging, redirect, click fraud, and identity theft threats
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Prevent malicious website, phishing, client-side, and embedded-code exploits
  • Protect hosts using the latest antivirus, pop-up blocker, and firewall software
  • Identify and terminate malicious processes using HIPS and NIPS

"synopsis" may belong to another edition of this title.

About the Author:

Michael A. Davis is CEO of Savid Technologies, Inc., a technology and security consulting firm. He has worked with McAfee, Inc., as senior manager of Global Threats. Michael is a member of the Honeynet Project.

Sean M. Bodmer is director of government programs at Savid Corporation, Inc. He is an active honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Sean works with the Honeynet Project and the Hacker Profiling Project.

Aaron LeMasters is a security researcher specializing in computer forensics, malware analysis, and vulnerability research. He spent five years defending the undefendable DoD networks and is now a senior software engineer at Raytheon SI.

"About this title" may belong to another edition of this title.

Top Search Results from the AbeBooks Marketplace

1.

Davis, Michael A.
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback Quantity Available: > 20
Seller
BargainBookStores
(Grand Rapids, MI, U.S.A.)
Rating
[?]

Book Description Paperback. Book Condition: New. Bookseller Inventory # 1707178

More Information About This Seller | Ask Bookseller a Question

Buy New
28.57
Convert Currency

Add to Basket

Shipping: 3.06
Within U.S.A.
Destination, Rates & Speeds

2.

Michael A. Davis, Sean M. Bodmer, Jason Lord
Published by McGraw-Hill Education - Europe, United States (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback Quantity Available: 10
Seller
The Book Depository US
(London, United Kingdom)
Rating
[?]

Book Description McGraw-Hill Education - Europe, United States, 2009. Paperback. Book Condition: New. Language: English . Brand New Book. A harrowing guide to where the bad guys hide, and how you can find them. --Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face. --From the Foreword by Lance Spitzner, President of the Honeynet Project Don t let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today s hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterprise Learn how hackers use archivers, encryptors, and packers to obfuscate code Implement effective intrusion detection and prevention procedures Defend against keylogging, redirect, click fraud, and identity theft threats Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploits Protect hosts using the latest antivirus, pop-up blocker, and firewall software Identify and terminate malicious processes using HIPS and NIPS. Bookseller Inventory # AAC9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
33.50
Convert Currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, Rates & Speeds

3.

Michael A. Davis, Sean M. Bodmer, Jason Lord
Published by McGraw-Hill Education - Europe, United States (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback Quantity Available: 10
Seller
The Book Depository
(London, United Kingdom)
Rating
[?]

Book Description McGraw-Hill Education - Europe, United States, 2009. Paperback. Book Condition: New. Language: English . Brand New Book. A harrowing guide to where the bad guys hide, and how you can find them. --Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face. --From the Foreword by Lance Spitzner, President of the Honeynet Project Don t let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today s hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterprise Learn how hackers use archivers, encryptors, and packers to obfuscate code Implement effective intrusion detection and prevention procedures Defend against keylogging, redirect, click fraud, and identity theft threats Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploits Protect hosts using the latest antivirus, pop-up blocker, and firewall software Identify and terminate malicious processes using HIPS and NIPS. Bookseller Inventory # AAC9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
34.38
Convert Currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, Rates & Speeds

4.

Davis, Michael A.; Bodmer, Sean M.; LeMasters, Aaron
Published by McGraw-Hill Education
ISBN 10: 0071591184 ISBN 13: 9780071591188
New PAPERBACK Quantity Available: 1
Seller
Booklot COM LLC
(Philadelphia, PA, U.S.A.)
Rating
[?]

Book Description McGraw-Hill Education. PAPERBACK. Book Condition: New. 0071591184. Bookseller Inventory # Z0071591184ZN

More Information About This Seller | Ask Bookseller a Question

Buy New
34.88
Convert Currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, Rates & Speeds

5.

Davis, Michael A.; Bodmer, Sean M.; LeMasters, Aaron
Published by McGraw-Hill Education
ISBN 10: 0071591184 ISBN 13: 9780071591188
New PAPERBACK Quantity Available: 3
Seller
Lakeside Books
(Benton Harbor, MI, U.S.A.)
Rating
[?]

Book Description McGraw-Hill Education. PAPERBACK. Book Condition: New. 0071591184 BRAND NEW, GIFT QUALITY! NOT OVERSTOCKS OR MARKED UP REMAINDERS! DIRECT FROM THE PUBLISHER!|1.6. Bookseller Inventory # OTF-S-9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
31.91
Convert Currency

Add to Basket

Shipping: 3.06
Within U.S.A.
Destination, Rates & Speeds

6.

Davis, Michael A.
Published by McGraw-Hill Education (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback Quantity Available: 11
Seller
Murray Media
(North Miami Beach, FL, U.S.A.)
Rating
[?]

Book Description McGraw-Hill Education, 2009. Paperback. Book Condition: New. Bookseller Inventory # 0071591184

More Information About This Seller | Ask Bookseller a Question

Buy New
32.79
Convert Currency

Add to Basket

Shipping: 2.30
Within U.S.A.
Destination, Rates & Speeds

7.

Michael Davis
Published by McGraw-Hill/Osborne Media
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback Quantity Available: 20
Seller
BuySomeBooks
(Las Vegas, NV, U.S.A.)
Rating
[?]

Book Description McGraw-Hill/Osborne Media. Paperback. Book Condition: New. Paperback. 400 pages. Dimensions: 9.0in. x 7.3in. x 0.9in.A harrowing guide to where the bad guys hide, and how you can find them. --Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face. --From the Foreword by Lance Spitzner, President of the Honeynet Project Dont let another machine become a zombie in the malware armyDefend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how todays hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterpriseLearn how hackers use archivers, encryptors, and packers to obfuscate codeImplement effective intrusion detection and prevention proceduresDefend against keylogging, redirect, click fraud, and identity theft threatsDetect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploitsProtect hosts using the latest antivirus, pop-up blocker, and firewall softwareIdentify and terminate malicious processes using HIPS and NIPS This item ships from multiple locations. Your book may arrive from Roseburg,OR, La Vergne,TN. Paperback. Bookseller Inventory # 9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
32.50
Convert Currency

Add to Basket

Shipping: 3.03
Within U.S.A.
Destination, Rates & Speeds

8.

Davis, Michael; Bodmer, Sean; LeMasters, Aaron
Published by McGraw-Hill Education (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback Quantity Available: 10
Seller
Ergodebooks
(RICHMOND, TX, U.S.A.)
Rating
[?]

Book Description McGraw-Hill Education, 2009. Paperback. Book Condition: New. Bookseller Inventory # INGM9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
34.21
Convert Currency

Add to Basket

Shipping: 3.06
Within U.S.A.
Destination, Rates & Speeds

9.

Michael A Davis, Sean M Bodmer, Aaron Lemasters
Published by McGraw-Hill Education 2009-11-01, New York |London (2009)
ISBN 10: 0071591184 ISBN 13: 9780071591188
New paperback Quantity Available: > 20
Seller
Blackwell's
(Oxford, OX, United Kingdom)
Rating
[?]

Book Description McGraw-Hill Education 2009-11-01, New York |London, 2009. paperback. Book Condition: New. Bookseller Inventory # 9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
34.39
Convert Currency

Add to Basket

Shipping: 3
From United Kingdom to U.S.A.
Destination, Rates & Speeds

10.

Michael Davis
ISBN 10: 0071591184 ISBN 13: 9780071591188
New Paperback First Edition Quantity Available: 1
Seller
Grand Eagle Retail
(Wilmington, DE, U.S.A.)
Rating
[?]

Book Description Paperback. Book Condition: New. 1st. Paperback. A harrowing guide to where the bad guys hide, and how you can find them. --Dan Kaminsky, Director of Penetration Testing, IOActive An amazing resource. It is timely, focused, and what we n.Shipping may be from multiple locations in the US or from the UK, depending on stock availability. 377 pages. 0.726. Bookseller Inventory # 9780071591188

More Information About This Seller | Ask Bookseller a Question

Buy New
38.52
Convert Currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, Rates & Speeds

There are more copies of this book

View all search results for this book