|
Showing 1 - 1 of
1 matches in All Departments
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the product. Arm
yourself for the escalating war against malware and rootkits Thwart
debilitating cyber-attacks and dramatically improve your
organization's security posture using the proven defense strategies
in this thoroughly updated guide. Hacking Exposed (TM) Malware and
Rootkits: Security Secrets & Solutions, Second Edition fully
explains the hacker's latest methods alongside ready-to-deploy
countermeasures. Discover how to block pop-up and phishing
exploits, terminate embedded code, and identify and eliminate
rootkits. You will get up-to-date coverage of intrusion detection,
firewall, honeynet, antivirus, and anti-rootkit technology. * Learn
how malware infects, survives, and propagates across an enterprise
* See how hackers develop malicious code and target vulnerable
systems * Detect, neutralize, and remove user-mode and kernel-mode
rootkits * Use hypervisors and honeypots to uncover and kill
virtual rootkits * Defend against keylogging, redirect, click
fraud, and identity theft * Block spear phishing, client-side, and
embedded-code exploits * Effectively deploy the latest antivirus,
pop-up blocker, and firewall software * Identify and stop malicious
processes using IPS solutions
|
You may like...
Operation Joktan
Amir Tsarfati, Steve Yohn
Paperback
(1)
R250
R211
Discovery Miles 2 110
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Not available
|