Christopher Elisan - Böcker
537 kr
Skickas inom 3-6 vardagar
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Security Smarts for the Self-Guided IT ProfessionalLearn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practicesfor thwarting them.
After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get startedprotecting your network right away.
Malware, Rootkits & Botnets: A Beginner's Guidefeatures:
Lingo--Common security terms defined so that you're in the know on the jobIMHO--Frank and relevant opinions based on theauthor's years of industry experienceBudget Note--Tips for getting security technologies and processes into your organization's budgetIn Actual Practice--Exceptions to the rules of security explained in real-world contextsYour Plan--Customizable checklists you can use on the job nowInto Action--Tips on how, why, and when to applynew skills and techniques at work754 kr
Skickas inom 3-6 vardagar
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware.
After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then, you’ll learn how to use dozens of malware analysis tools, organize data, and create metrics-rich reports.
A crucial tool for combatting malware—which currently hits each second globallyFilled with undocumented methods for customizing dozens of analysis software tools for very specific usesLeads you through a malware blueprint first, then lab setup, and finally analysis and reporting activitiesEvery tool explained in this book is available in every country around the worldHacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
692 kr
Skickas inom 3-6 vardagar
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Arm yourself for the escalating war against malware and rootkits
Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.
• Learn how malware infects, survives, and propagates across an enterprise• See how hackers develop malicious code and target vulnerable systems• Detect, neutralize, and remove user-mode and kernel-mode rootkits • Use hypervisors and honeypots to uncover and kill virtual rootkits• Defend against keylogging, redirect, click fraud, and identity theft• Block spear phishing, client-side, and embedded-code exploits• Effectively deploy the latest antivirus, pop-up blocker, and firewall software• Identify and stop malicious processes using IPS solutions