E-books in Russian and English



<<< >>>

Welcome
(Seattle, Washington, United States)

 


Enter · Register · Search

 
 
   
 
 
 
« Ноябрь 2009 »
Пн Вт Ср Чт Пт Сб Вс
 1
2345678
9101112131415
16171819202122
23242526272829
30 
 
One Week Top10:
 2  3   4

HACKING EXPOSED MALWARE AND ROOTKITS

date: 21 ноября 2009 / author: izograv / категория: Hack / views: 1402 / comments: 1

HACKING EXPOSED MALWARE AND ROOTKITS by Michael Davis, Sean Bodmer, and Aaron LeMasters



Don't let another machine become a zombie in the malware army

Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.

* Understand how malware infects, survives, and propagates across an enterprise
* Learn how hackers use archivers, encryptors, and packers to obfuscate code
* Implement effective intrusion detection and prevention procedures
* Defend against keylogging, redirect, click fraud, and identity theft threats
* Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
* Prevent malicious website, phishing, client-side, and embedded-code exploits
* Protect hosts using the latest antivirus, pop-up blocker, and firewall software
*
Identify and terminate malicious processes using HIPS and NIPS



 

Comments: 1

1. Cmeliy | 22 ноября 2009 - 17:33

Mirror please.
 
 
 
Year Top:
2011
2010
2009
2008
2007
2006
 
  

 


 

Design/Web/Support/Anti-Leech by izograv @ yandex.ru
Optimized for Firefox | Anti-Leech tested on IE, Firefox, Reget