Low Price Guarantee
We Take School POs
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Revised Edition
Contributor(s): Elisan, Christopher C. (Author), Davis, Michael A. (Author), Bodmer, Sean M. (Author)

View larger image

ISBN: 0071823077     ISBN-13: 9780071823074
Publisher: McGraw-Hill Companies
Retail: $66.00OUR PRICE: $48.18  
  Buy 25 or more:OUR PRICE: $44.22   Save More!
  Buy 100 or more:OUR PRICE: $42.24   Save More!


  WE WILL NOT BE UNDERSOLD!   Click here for our low price guarantee

Binding Type: Paperback - See All Available Formats & Editions
Published: December 2016
Qty:
Additional Information
BISAC Categories:
- Computers | Security - Networking
- Computers | Security - Viruses & Malware
- Computers | Networking - General
Dewey: 005.8
LCCN: 2016048432
Physical Information: 0.9" H x 7.4" W x 9" L (1.5 lbs) 384 pages
Features: Illustrated, Index, Price on Product
 
Descriptions, Reviews, Etc.
Publisher Description:

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


Arm yourself for the escalating war against malware and rootkits

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed(TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.

- Learn how malware infects, survives, and propagates across an enterprise
- See how hackers develop malicious code and target vulnerable systems
- Detect, neutralize, and remove user-mode and kernel-mode rootkits
- Use hypervisors and honeypots to uncover and kill virtual rootkits
- Defend against keylogging, redirect, click fraud, and identity theft
- Block spear phishing, client-side, and embedded-code exploits
- Effectively deploy the latest antivirus, pop-up blocker, and firewall software
- Identify and stop malicious processes using IPS solutions


Contributor Bio(s): Lemasters, Aaron: - Aaron LeMasters, CISSP(R), GCIH(R), CSTP(R) Aaron LeMasters (M.S. George Washington University) is a seasoned computer nerd specializing in computer forensics and vulnerability analysis. The first five years of his career were spent fighting to defend global DoD networks, and he is now a Senior Software Engineer at Raytheon. Aaron prefers to pacify his short attention span with advanced research and development issues related to Windows internals, system integrity, Reverse Engineering and Malware Analysis. He is an enthusiastic prototypist and enjoys developing tools that complement his research interests. In his spare time, Aaron plays basketball, sketches, jams on his Epiphone Les Paul, and travels frequently to New York City with his wife.Davis, Michael A.: - Michael A. Davis is CEO of Savid Technologies, Inc. a national technology and security consulting firm. Michael is well known in the Open Source Security industry with his porting of security tools to the Windows platforms including tools such as snort, ngrep, dsniff, and honeyd. Michael is also a member of the Honeynet project where he is working to develop data and network control mechanisms for windows based honeynets. Michael is also the developer of sebek for windows, a kernel based data collection and monitoring tool for honeynets. Michael has worked with McAfee, Inc. a leader in anti-virus protection and vulnerability management, as Senior Manager of Global Threats where he lead a team of researchers investigating confidential and cutting edge security research. Prior to McAfee, Michael A. Davis worked at Foundstone.Elisan, Christopher C.: -

Michael A. Davis is chief technology officer at CounterTack. He was voted one of the "Top 25 under 25" by BusinessWeek and was a semi-finalist for Ernst and Young's "Entrepreneur of the Year" award.

Sean M. Bodmer, CISSP, CEH, is chief researcher of Counter-Exploitation Intelligence at CounterTack and co-author of Reverse Deception: Organized Cyber Threat Counter-Exploitation.

Christopher C. Elisan is a seasoned reverse engineer. He frequently speaks at various security conferences around the globe and provides expert opinion on malware for leading industry and mainstream publications. He is currently the principal malware scientist at RSA.

Aaron LeMasters is currently a senior security researcher at CrowdStrike and has previously worked in various research positions at Mandiant, Raytheon SI, and the Department of Defense. He specializes in Windows operating system internals.

Bodmer, Sean M.: - Sean M. Bodmer CISSP(R) CEH(R) Sean M. Bodmer is Director of Federal and Military Programs at Savid Corporation, Inc. Sean is an active Honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Most notably he has spent several years leading the operations and analysis of advanced intrusion detection systems (honeynets) where the motives and intent of attackers and their tools can be captured and analyzed in order to generate actionable intelligence to further protect customer networks. Sean has worked in various Systems Security Engineering roles for various federal government entities and private corporations over the past decade in the Washington D.C. Metro area. Sean has lectured across the United States at industry conferences such as DEFCON, PhreakNIC, DC3, NW3C, Carnegie Mellon CERT, and the Pentagon Security Forum all covering the aspects of attack and attacker assessment profiling in order to identify the true motivations and intent behind cyber attacks.
 
Customer ReviewsSubmit your own review
 
To tell a friend about this book, you must Sign In First!