Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
By:Bodmer, Sean; LeMasters, Aaron; Davis, Michael; Elisan, Christopher
Pub Date:November 5th 2016
Format:Mixed media product 400 pages
ISBN:0071823077 / 9780071823074
Your Price:$60.00 ADD TO CART
More Information




Main description

The latest exclusive Hacking Exposed strategies for defending against the world's number one attack type: malware

Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail.

  • Counter today's most virulent network attack types
  • Find out how malware infects, survives, and propagates across an enterprise
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Defend against keylogging, redirect, click fraud, and identity theft threats


Table of contents

Part I: Malware
Chapter 1: Methods & Vectors
Chapter 2: Behaviors & Traits
Part II: Rootkits
Chapter 3: User-Mode Rootkits
Chapter 4: Kernel-Mode Rootkits
Chapter 5: Virtual Rootkits
Chapter 6: The Future of Rootkits
Part III: Prevention Techniques
Chapter 7: The Fall of AV
Chapter 8: Host Based Protection
Chapter 9: Detection on the Wire
Chapter 10: Indicators of Compromise
Chapter 11: Countermeasures & Best Practices
Chapter 12: The Adversary Focused Methodology
Chapter 13: The Human Problem


Backcover

Author Information


Sean M. Bodmer CISSP® CEH® Sean M. Bodmer is Director of Federal and Military Programs at Savid Corporation, Inc. Sean is an active Honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Most notably he has spent several years leading the operations and analysis of advanced intrusion detection systems (honeynets) where the motives and intent of attackers and their tools can be captured and analyzed in order to generate actionable intelligence to further protect customer networks. Sean has worked in various Systems Security Engineering roles for various federal government entities and private corporations over the past decade in the Washington D.C. Metro area. Sean has lectured across the United States at industry conferences such as DEFCON, PhreakNIC, DC3, NW3C, Carnegie Mellon CERT, and the Pentagon Security Forum all covering the aspects of attack and attacker assessment profiling in order to identify the true motivations and intent behind cyber attacks.


Aaron LeMasters, CISSP®, GCIH®, CSTP® Aaron LeMasters (M.S. George Washington University) is a seasoned computer nerd specializing in computer forensics and vulnerability analysis. The first five years of his career were spent fighting to defend global DoD networks, and he is now a Senior Software Engineer at Raytheon. Aaron prefers to pacify his short attention span with advanced research and development issues related to Windows internals, system integrity, Reverse Engineering and Malware Analysis. He is an enthusiastic prototypist and enjoys developing tools that complement his research interests. In his spare time, Aaron plays basketball, sketches, jams on his Epiphone Les Paul, and travels frequently to New York City with his wife.


Michael A. Davis is CEO of Savid Technologies, Inc. a technology and security consulting firm. He has worked with McAfee, Inc., as senior manager of Global Threats. Michael is also a member of the Honeynet Project where he is working to develop data and network control mechanisms for Windows-based honeynets.


Christopher C. Elisan, a seasoned reverse engineer and malware researcher, is the principal malware scientist at RSA NetWitness. He frequently contributes expert opinion about malware, botnets, and advance persistent threats for leading publications, including USA Today, InformationWeek, and Dark Reading.

Downloads & Resources

Downloads



Related Products

Owl Image

Date: Nov 22nd, 2016
Your Price: $50.00
Owl Image

Date: Nov 6th, 2016
Your Price: $140.00
Owl Image

Date: Oct 22nd, 2016
Your Price: $110.00
Owl Image

Date: Aug 26th, 2016
Your Price: $35.00
Owl Image

Date: May 22nd, 2016
Your Price: $80.00
Owl Image

Date: Apr 25th, 2016
Your Price: $85.00
Owl Image

Date: Mar 4th, 2016
Your Price: $60.00
Owl Image

Date: Dec 29th, 2015
Your Price: $99.00
Owl Image

Date: Dec 3rd, 2015
Your Price: $95.00
Owl Image

Date: Dec 3rd, 2015
Your Price: $70.00
Owl Image

Date: Oct 12th, 2015
Your Price: $60.00
Owl Image

Date: Oct 12th, 2015
Your Price: $60.00
Owl Image

Date: Sep 17th, 2015
Your Price: $50.00
Owl Image

Date: Sep 5th, 2015
Your Price: $65.00
Owl Image

Date: Aug 13th, 2015
Your Price: $65.00