Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
- 出版商: McGraw-Hill Education
- 出版日期: 2016-12-30
- 定價: $2,600
- 售價: 8.0 折 $2,080
- 語言: 英文
- 頁數: 384
- 裝訂: Paperback
- ISBN: 0071823077
- ISBN-13: 9780071823074
-
相關分類:
資訊安全、駭客 Hack
-
相關翻譯:
黑客大曝光 : 惡意軟件和 Rootkit 安全, 2/e (簡中版)
立即出貨 (庫存=1)
買這商品的人也買了...
-
$1,613$1,528 -
$2,510$2,385 -
$880$862 -
$800$632 -
$534$507 -
$1,068$1,015 -
$834$792 -
$1,280$998 -
$894$849 -
$714$678 -
$828$787 -
$414$393 -
$714$678 -
$556RocketMQ 技術內幕:RocketMQ 架構設計與實現原理, 2/e
-
$602深入理解 RPC 框架原理與實現
-
$560$437 -
$774$735 -
$600$468 -
$354$336 -
$520$406 -
$600$468 -
$714$678 -
$714$678 -
$650$507 -
$1,280$845
相關主題
商品描述
The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware
Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail.
- Counter today’s most virulent network attack types
- Find out how malware infects, survives, and propagates across an enterprise
- Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
- Learn how hackers use archivers, encryptors, and packers to obfuscate code
- Defend against keylogging, redirect, click fraud, and identity theft threats
商品描述(中文翻譯)
最新的《Hacking Exposed Malware & Rootkits, Second Edition》提供了對抗全球頭號攻擊類型——惡意軟體的最新獨家策略。本書全面更新,涵蓋了最新的工具、技術和攻擊手法,以可靠的方法引導您抵禦不斷襲擊的惡意軟體和根套件。第二版包含全新的實際案例研究和尖端示例,揭示了駭客如何使用現成的工具滲透和劫持網絡。本書以逐步解釋對策的方式,提供了最佳的訓練,以檢測和消除惡意嵌入式代碼。最新的入侵檢測、誘餌、防病毒、防根套件和防間諜技術都有詳細介紹。
- 對抗當今最具毒性的網絡攻擊類型
- 了解惡意軟體如何感染、存活和在企業中傳播
- 檢測、殺死和移除虛擬、用戶模式和核心模式的根套件
- 學習駭客如何使用壓縮軟體、加密軟體和打包軟體來混淆代碼
- 防範鍵盤記錄、重定向、點擊欺詐和身份盜竊威脅