Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition
- 6h 45m
- Aaron LeMasters, Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer
- McGraw-Hill/Osborne
- 2017
Arm yourself for the escalating war against malware and rootkits
Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.
- Learn how malware infects, survives, and propagates across an enterprise
- See how hackers develop malicious code and target vulnerable systems
- Detect, neutralize, and remove user-mode and kernel-mode rootkits
- Use hypervisors and honeypots to uncover and kill virtual rootkits
- Defend against keylogging, redirect, click fraud, and identity theft
- Block spear phishing, client-side, and embedded-code exploits
- Effectively deploy the latest antivirus, pop-up blocker, and firewall software
- Identify and stop malicious processes using IPS solutions
About the Authors
Michael A. Davis is chief technology officer at CounterTack. He was voted one of the "Top 25 under 25" by BusinessWeek and was a semi-finalist for Ernst and Young's "Entrepreneur of the Year" award.
Sean M. Bodmer, CISSP, CEH, is chief researcher of Counter-Exploitation Intelligence at CounterTack and co-author of Reverse Deception: Organized Cyber Threat Counter-Exploitation.
Christopher C. Elisan is a seasoned reverse engineer. He frequently speaks at various security conferences around the globe and provides expert opinion on malware for leading industry and mainstream publications. He is currently the principal malware scientist at RSA.
Aaron LeMasters is currently a senior security researcher at CrowdStrike and has previously worked in various research positions at Mandiant, Raytheon SI, and the Department of Defense. He specializes in Windows operating system internals.
In this Book
-
Malware Propagation
-
Malware Functionality
-
User-Mode Rootkits
-
Kernel-Mode Rootkits
-
Virtual Rootkits
-
The Future of Rootkits
-
Antivirus
-
Host Protection Systems
-
Host-Based Intrusion Prevention
-
Rootkit Detection
-
General Security Practices