Kirjojen hintavertailu. Mukana 12 390 323 kirjaa ja 12 kauppaa.

Kirjailija

Sean Bodmer

Kirjat ja teokset yhdessä paikassa: 2 kirjaa, julkaisuja vuosilta 2012-2017, suosituimpien joukossa Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

2 kirjaa

Kirjojen julkaisuhaarukka 2012-2017.

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Christopher Elisan; Michael Davis; Sean Bodmer; Aaron LeMasters

McGraw-Hill Professional
2017
nidottu
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.• Learn how malware infects, survives, and propagates across an enterprise• See how hackers develop malicious code and target vulnerable systems• Detect, neutralize, and remove user-mode and kernel-mode rootkits • Use hypervisors and honeypots to uncover and kill virtual rootkits• Defend against keylogging, redirect, click fraud, and identity theft• Block spear phishing, client-side, and embedded-code exploits• Effectively deploy the latest antivirus, pop-up blocker, and firewall software• Identify and stop malicious processes using IPS solutions
Reverse Deception: Organized Cyber Threat Counter-Exploitation

Reverse Deception: Organized Cyber Threat Counter-Exploitation

Sean Bodmer; Max Kilger; Gregory Carpenter; Jade Jones

McGraw-Hill Professional
2012
nidottu
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.In-depth counterintelligence tactics to fight cyber-espionage"A comprehensive and unparalleled overview of the topic by experts in the field."--SlashdotExpose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaignIdentify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnetsWork with intrusion detection, anti-virus, and digital forensics toolsEmploy stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement