|
Showing 1 - 3 of
3 matches in All Departments
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the
product.Security Smarts for the Self-Guided IT Professional Learn
how to improve the security posture of your organization and defend
against some of the most pervasive network attacks. Malware,
Rootkits & Botnets: A Beginner's Guide explains the nature,
sophistication, and danger of these risks and offers best
practicesfor thwarting them. After reviewing the current threat
landscape, the book describes the entire threat lifecycle,
explaining how cybercriminals create, deploy, and manage the
malware, rootkits, and botnets under their control. You'll learn
proven techniques for identifying and mitigating these malicious
attacks. Templates, checklists, and examples give you the hands-on
help you need to get startedprotecting your network right away.
Malware, Rootkits & Botnets: A Beginner's Guidefeatures:
Lingo--Common security terms defined so that you're in the know on
the job IMHO--Frank and relevant opinions based on theauthor's
years of industry experience Budget Note--Tips for getting security
technologies and processes into your organization's budget In
Actual Practice--Exceptions to the rules of security explained in
real-world contexts Your Plan--Customizable checklists you can use
on the job now Into Action--Tips on how, why, and when to applynew
skills and techniques at work
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the product. A
one-of-a-kind guide to setting up a malware research lab, using
cutting-edge analysis tools, and reporting the findingsAdvanced
Malware Analysis is a critical resource for every information
security professional's anti-malware arsenal. The proven
troubleshooting techniques will give an edge to information
security professionals whose job involves detecting, decoding, and
reporting on malware. After explaining malware architecture and how
it operates, the book describes how to create and configure a
state-of-the-art malware research lab and gather samples for
analysis. Then, you'll learn how to use dozens of malware analysis
tools, organize data, and create metrics-rich reports. A crucial
tool for combatting malware-which currently hits each second
globally Filled with undocumented methods for customizing dozens of
analysis software tools for very specific uses Leads you through a
malware blueprint first, then lab setup, and finally analysis and
reporting activities Every tool explained in this book is available
in every country around the world
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the product. Arm
yourself for the escalating war against malware and rootkits Thwart
debilitating cyber-attacks and dramatically improve your
organization's security posture using the proven defense strategies
in this thoroughly updated guide. Hacking Exposed (TM) Malware and
Rootkits: Security Secrets & Solutions, Second Edition fully
explains the hacker's latest methods alongside ready-to-deploy
countermeasures. Discover how to block pop-up and phishing
exploits, terminate embedded code, and identify and eliminate
rootkits. You will get up-to-date coverage of intrusion detection,
firewall, honeynet, antivirus, and anti-rootkit technology. * Learn
how malware infects, survives, and propagates across an enterprise
* See how hackers develop malicious code and target vulnerable
systems * Detect, neutralize, and remove user-mode and kernel-mode
rootkits * Use hypervisors and honeypots to uncover and kill
virtual rootkits * Defend against keylogging, redirect, click
fraud, and identity theft * Block spear phishing, client-side, and
embedded-code exploits * Effectively deploy the latest antivirus,
pop-up blocker, and firewall software * Identify and stop malicious
processes using IPS solutions
|
|