Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practicesfor thwarting them.
After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get startedprotecting your network right away.
Malware, Rootkits & Botnets: A Beginner's Guidefeatures:
Lingo--Common security terms defined so that you're in the know on the job
IMHO--Frank and relevant opinions based on theauthor's years of industry experience
Budget Note--Tips for getting security technologies and processes into your organization's budget
In Actual Practice--Exceptions to the rules of security explained in real-world contexts
Your Plan--Customizable checklists you can use on the job now
Into Action--Tips on how, why, and when to applynew skills and techniques at work
Sprache
Verlagsort
Verlagsgruppe
McGraw-Hill Education - Europe
Zielgruppe
Produkt-Hinweis
Broschur/Paperback
Klebebindung
Illustrationen
Maße
Höhe: 239 mm
Breite: 189 mm
Dicke: 30 mm
Gewicht
ISBN-13
978-0-07-179206-6 (9780071792066)
Schweitzer Klassifikation
Christopher C. Elisan, a seasoned reverse engineer and malware researcher, is the principal malware scientist at RSA NetWitness. He frequently contributes expert opinion about malware, botnets, and advance persistent threats for leading publications, including USA Today, InformationWeek, and Dark Reading.
Chapter 1. Getting in Gear
Chapter 2. A Brief History of Malware
Chapter 3. Cloak of the Rootkit
Chapter 4. Rise of the Botnets
Chapter 5. The Threat Ecosystem
Chapter 6. The Malware Factory
Chapter 7. Infection Vectors
Chapter 8. The Compromised System
Chapter 9. Understanding Your System
Chapter 10. Identifying a Possible Threat
Chapter 11. Mitigating a Known Threat
Chapter 12. The Never-Ending Race