Hacking exposed Malware & Rootkits : Malware & Rootkits security secrets & solutions

Michael Davis, Sean Bodmer, Aaron Lemasters

"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterprise Learn how hackers use archivers, encryptors, and packers to obfuscate code Implement effective intrusion detection and prevention procedures Defend against keylogging, redirect, click fraud, and identity theft threats Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploits Protect hosts using the latest antivirus, pop-up blocker, and firewall software Identify and terminate malicious processes using HIPS and NIPS

「Nielsen BookData」より

[目次]

  • Part I Malware Case Study: Please Review This Before Our Quarterly Meeting Chapter 1 Method of Infection Chapter 2 Malware Functionality Part II Rootkits Case Study: The Invisible Rootkit That Steals Your Bank Account Data Chapter 3 User-Mode Rootkits Chapter 4 Kernel-Mode Rootkits Chapter 5 Virtual Rootkits Chapter 6 The Future of Rootkits: If You Think It's Bad Now Part III Prevention Technologies Case Study: A Wolf In Sheep's Clothing Chapter 7 Antivirus Chapter 8 Host Protection Systems Chapter 9 Host-Based Intrusion Prevention Chapter 10 Rootkit Detection Chapter 11 General Security Practices Appendix A System Integrity Analysis: Building Your Own Rootkit Detector Index

「Nielsen BookData」より

この本の情報

書名 Hacking exposed Malware & Rootkits : Malware & Rootkits security secrets & solutions
著作者等 Bodmer Sean
Davis Michael A.
Lemasters Aaron
Lord Jason
Davis Michael
書名別名 Hacking exposed Malware & Rootkits : Malware & Rootkits secrets & solutions
出版元 McGraw-Hill
刊行年月 c2010
ページ数 xxii, 377 p.
大きさ 24 cm
ISBN 9780071591188
NCID BB00012270
※クリックでCiNii Booksを表示
言語 英語
出版国 アメリカ合衆国
この本を: 
このエントリーをはてなブックマークに追加

このページを印刷

外部サイトで検索

この本と繋がる本を検索

ウィキペディアから連想