Millions of books in English, Spanish and other languages. Free UK delivery 

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
Type
Physical Book
Year
2016
Language
English
Pages
384
Format
Paperback
Dimensions
22.9 x 18.8 x 2.3 cm
Weight
0.68 kg.
ISBN13
9780071823074
Edition No.
0002

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Michael Davis (Author) · Christopher Elisan (Author) · Sean Bodmer (Author) · McGraw-Hill Companies · Paperback

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition - Elisan, Christopher ; Davis, Michael ; Bodmer, Sean

New Book

£ 58.24

  • Condition: New
Origin: U.S.A. (Import costs included in the price)
It will be shipped from our warehouse between Thursday, May 23 and Monday, June 10.
You will receive it anywhere in United Kingdom between 1 and 3 business days after shipment.

Synopsis "Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition"

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed(TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.- Learn how malware infects, survives, and propagates across an enterprise- See how hackers develop malicious code and target vulnerable systems- Detect, neutralize, and remove user-mode and kernel-mode rootkits - Use hypervisors and honeypots to uncover and kill virtual rootkits- Defend against keylogging, redirect, click fraud, and identity theft- Block spear phishing, client-side, and embedded-code exploits- Effectively deploy the latest antivirus, pop-up blocker, and firewall software- Identify and stop malicious processes using IPS solutions

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews