Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters

買這商品的人也買了...

相關主題

商品描述

The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware

Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail.

  • Counter today’s most virulent network attack types
  • Find out how malware infects, survives, and propagates across an enterprise
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Defend against keylogging, redirect, click fraud, and identity theft threats

商品描述(中文翻譯)

最新的《Hacking Exposed Malware & Rootkits, Second Edition》提供了對抗全球頭號攻擊類型——惡意軟體的最新獨家策略。本書全面更新,涵蓋了最新的工具、技術和攻擊手法,以可靠的方法引導您抵禦不斷襲擊的惡意軟體和根套件。第二版包含全新的實際案例研究和尖端示例,揭示了駭客如何使用現成的工具滲透和劫持網絡。本書以逐步解釋對策的方式,提供了最佳的訓練,以檢測和消除惡意嵌入式代碼。最新的入侵檢測、誘餌、防病毒、防根套件和防間諜技術都有詳細介紹。

- 對抗當今最具毒性的網絡攻擊類型
- 了解惡意軟體如何感染、存活和在企業中傳播
- 檢測、殺死和移除虛擬、用戶模式和核心模式的根套件
- 學習駭客如何使用壓縮軟體、加密軟體和打包軟體來混淆代碼
- 防範鍵盤記錄、重定向、點擊欺詐和身份盜竊威脅