Rootkits for Dummies
暫譯: 根套件入門指南
Larry Stevenson, Nancy Altholz
- 出版商: Hungry Minds
- 出版日期: 2007-01-30
- 售價: $1,300
- 貴賓價: 9.5 折 $1,235
- 語言: 英文
- 頁數: 380
- 裝訂: Paperback
- ISBN: 0471917109
- ISBN-13: 9780471917106
已過版
買這商品的人也買了...
-
$1,330Beginning Perl for Bioinformatics (Paperback)
-
$450$356 -
$1,260CCNA Certification Library (CCNA Self-Study, exam #640-801), 6/e
-
$720$562 -
$931Information Security Illuminated
-
$1,200$1,176 -
$820$648 -
$2,205The Java Programming Language, 4/e (Paperback)
-
$1,280$1,216 -
$780$663 -
$3,026$2,875 -
$850$723 -
$550$435 -
$620$490 -
$450$356 -
$480$408 -
$590$466 -
$580$452 -
$580$493 -
$720$569 -
$650$514 -
$1,176Business Data Communications and Networking, 9/e
-
$780$663 -
$490$417 -
$480$374
相關主題
商品描述
Description
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, connections, and keyboards. A rootkit hacker can gain access to your systems and stay there for years, completely undetected.Learn from respected security experts and Microsoft Security MVPs how to recognize rootkits, get rid of them, and manage damage control.
Accompanying the book is a value-packed companion CD offering a unique suite of tools to help administrators and users detect rootkit problems, conduct forensic analysis, and make quick security fixes.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Table of Contents
Introduction.Part I: Getting to the Root of Rootkits.
Chapter 1: Much Ado about Malware.
Chapter 2: The Three Rs of Survivable Systems.
Part II: Resistance Is NOT Futile.
Chapter 3: Practicing Good Computer Hygiene.
Chapter 4: Staying Secure Online.
Chapter 5: Patching and Updating Your System and Software.
Chapter 6: Blurring the Lines of Network Security.
Part III: Giving Rootkits the Recognition They Deserve.
Chapter 7: Getting Windows to Lie to You: Discovering How Rootkits Hide.
Chapter 8: Sniffing Out Rootkits.
Chapter 9: Dealing with a Lying, Cheating Operating System.
Part IV: Readying for Recovery.
Chapter 10: Infected! Coping with Collateral Damage.
Chapter 11: Preparing for the Worst: Erasing the Hard Drive.
Part V: The Part of Tens.
Chapter 12: Ten (Plus One) Rootkits and Their Behaviors.
Chapter 13: Ten (Plus Two) Security Sites That Can Help You.
Appendix: About the CD.
Index.
商品描述(中文翻譯)
**描述**
根套件(rootkit)是一種惡意軟體,能夠讓駭客獲得對您的網路的「根」或管理員存取權。它們在系統的作業系統完全啟動之前就被激活,這使得它們極難被檢測到。根套件允許駭客安裝隱藏的檔案、進程和隱藏的使用者帳戶。駭客可以利用它們打開後門,以便從終端、連接和鍵盤攔截數據。根套件駭客可以獲得對您的系統的存取權,並在裡面潛伏多年,完全不被發現。
從受人尊敬的安全專家和微軟安全 MVP 學習如何識別根套件、清除它們並管理損害控制。
本書附帶一張價值豐富的伴隨 CD,提供一套獨特的工具,幫助管理員和使用者檢測根套件問題、進行取證分析並快速修復安全漏洞。
**注意:** CD-ROM/DVD 和其他補充材料不包含在電子書檔案中。
**目錄**
引言。
第一部分:深入根套件的根源。
第 1 章:關於惡意軟體的許多話題。
第 2 章:可存活系統的三個 R。
第二部分:抵抗並非徒勞。
第 3 章:實踐良好的電腦衛生。
第 4 章:保持線上安全。
第 5 章:修補和更新您的系統和軟體。
第 6 章:模糊網路安全的界限。
第三部分:給予根套件應有的認可。
第 7 章:讓 Windows 說謊:發現根套件如何隱藏。
第 8 章:嗅探根套件。
第 9 章:處理一個說謊和作弊的作業系統。
第四部分:為恢復做好準備。
第 10 章:感染了!應對附帶損害。
第 11 章:為最壞情況做準備:抹除硬碟。
第五部分:十的部分。
第 12 章:十個(加一個)根套件及其行為。
第 13 章:十個(加兩個)可以幫助您的安全網站。
附錄:關於 CD。
索引。