Cargando…

Malware, rootkits & botnets : a beginner's guide /

Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks an...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Elisan, Christopher C.
Otros Autores: Hypponen, Mikko
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill, ©2013.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn826867437
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 130206s2013 nyua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d COO  |d B24X7  |d DEBSZ  |d IDEBK  |d CDX  |d OCLCF  |d OCLCQ  |d TEFOD  |d OCLCQ  |d OCLCA  |d OCL  |d TOH  |d UKAHL  |d YDX  |d OCL  |d OCLCO  |d CZL  |d D6H  |d LIV  |d OCLCO  |d OCLCQ 
019 |a 809313296  |a 817810391  |a 1084418752 
020 |a 9780071792059  |q (electronic bk.) 
020 |a 0071792058  |q (electronic bk.) 
020 |z 128357893X 
020 |z 9781283578936 
020 |z 9780071792066 
020 |z 0071792066  |q (pbk.) 
029 1 |a AU@  |b 000050591467 
029 1 |a DEBBG  |b BV041120419 
029 1 |a DEBSZ  |b 396753043 
035 |a (OCoLC)826867437  |z (OCoLC)809313296  |z (OCoLC)817810391  |z (OCoLC)1084418752 
037 |a CL0500000190  |b Safari Books Online 
037 |a B7E752E2-F405-4CBB-BB3B-6C104416BAE6  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b E45 2013 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Elisan, Christopher C. 
245 1 0 |a Malware, rootkits & botnets :  |b a beginner's guide /  |c Christopher C. Elisan. 
246 3 |a Malware, rootkits and botnets 
260 |a New York :  |b McGraw-Hill,  |c ©2013. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
500 |a "Foreword by Mikko Hypponen"--Cover. 
504 |a Includes bibliographical references and index. 
505 0 |a Cover -- Title Page -- Copyright Page -- About the Author -- About the Technical Editors -- Contents at a Glance -- Contents -- Acknowledgments -- Foreword -- Introduction -- Why This Book? -- Who Should Read This Book -- What This Book Covers -- How to Use This Book -- How This Book Is Organized -- Part I -- Part II -- Part IV -- About the Series -- Lingo -- IMHO -- Budget Note -- In Actual Practice -- Your Plan -- Into Action -- Part I: Establishing the Foundation -- Chapter 1: Getting In Gear -- A Malware Encounter -- A Brief Overview of the Threat Landscape -- Threat to National Security -- Starting the Journey -- We've Covered -- References -- Chapter 2: A Brief History of Malware -- Computer Viruses -- Classification of Computer Viruses -- Early Challenges -- Malware -- Classification of Malware -- Evolution of Malware -- Riskware -- Classification of Riskware -- Malware Creation Kits -- The Impact of Malware -- We've Covered -- Chapter 3: Cloak of the Rootkit -- What Is a Rootkit? -- Environment Mechanics -- The Operating System Kernel -- User Mode and Kernel Mode -- Rings -- Switching from User Mode to Kernel Mode -- Types of Rootkits -- User-Mode Rootkits -- Kernel-Mode Rootkits -- Rootkit Techniques -- Hooking -- DLL Injection -- Direct Kernel Object Manipulation -- Tackling Rootkits -- We've Covered -- Chapter 4: Rise of the Botnets -- What Is a Botnet? -- Main Characteristics -- Key Components -- C&C Structure -- Botnet Usage -- Distributed Denial of Service Attack -- Click Fraud -- Spam Relay -- Pay-Per-Install Agent -- Large-Scale Information Harvesting -- Information Processing -- Botnet Protective Mechanisms -- Bulletproof Hosting -- Dynamic DNS -- Fast Fluxing -- Domain Fluxing -- The Fight Against Botnets -- The Technical Front -- The Legal Front -- We've Covered -- References -- Part II: Welcome to the Jungle. 
505 8 |a Chapter 5: The Threat Ecosystem -- The Threat Ecosystem -- The Technical Element -- The Human Element -- The Evolution of the Threat Ecosystem -- Advanced Persistent Threat -- The Attack Method -- The Attack Profitability -- Malware Economy -- Malware Outsourcing -- We've Covered -- Chapter 6: The Malware Factory -- The Need to Evade Antivirus -- Malware Incident Handling Process -- Malware Detection -- Circumventing the Antivirus Product -- The Need for an Army of Malware -- Next-Generation Malware Kits -- Stand-Alone Armoring Tools -- The Impact of an Armored Army of Malware -- The Malware Factory -- The Malware Assembly Line -- The Proliferation of Attacker Tools -- Malware Population Explosion -- We've Covered -- Chapter 7: Infection Vectors -- Infection Vectors -- Physical Media -- E-mail -- Instant Messaging and Chat -- Social Networking -- URL Links -- File Shares -- Software Vulnerabilities -- The Potential of Becoming an Infection Vector -- We've Covered -- Chapter 8: The Compromised System -- The Malware Infection Process -- Installation of Malware Files -- Setting Up Malware Persistency -- Removing Evidence of the Malware Installer -- Passing Control to the Malware -- The Active Malware -- Maintaining the Foothold -- Communicating with the Attacker -- Executing the Payload -- We've Covered -- Part III: The Enterprise Strikes Back -- Chapter 9: Protecting the Organization -- The Threat Incident Responders -- Understanding the Value of the System -- Value to the Organization -- Value to the Attacker -- Understanding the Characteristics of the System -- System Type -- Operational Impact -- Sensitivity of Hosted Data -- Users of the System -- Network Location -- Accessibility to the Asset -- Asset Access Rights -- Recovery -- System Status -- Prioritizing the Systems -- The Organization's Security Posture. 
505 8 |a Understanding the Cost of Compromise -- Direct Cost -- Indirect Cost -- Protecting the Systems -- Threat Modeling -- Identifying the Appropriate Solutions -- Proactive Threat Detection -- Creating an Incident Response Plan -- Identify Different Compromise Scenarios -- Identify Solution Patterns -- Define Roles and Responsibilities -- Establish Protocols -- Conduct Periodic Dry-Runs -- Review and Improve -- Putting Everything into Action -- Beyond Protection -- We've Covered -- Chapter 10: Detecting the Threat -- Establishing a Baseline -- Establishing a Network Baseline -- Establishing a Host Baseline -- Detecting Anomalies -- Detecting Network Anomalies -- Detecting Host Anomalies -- Isolating the Source of the Anomaly -- Diving into the Compromised Asset -- Pinpointing the Malware -- Classifying the Malware Based on Its Attack Directive -- We've Covered -- Chapter 11: Mitigating the Threat -- Threat Mitigation -- Immediate Response -- Containment -- Verification -- Threat Detection and Classification -- Remediation and Restoration -- Proactive Response -- Preventive Measures -- Conducting a Periodic Security Audit -- The Threat from Insiders -- Who Are the Insider Threats? -- Mitigating the Insider Threat -- Be Vigilant -- We've Covered -- Part IV: Final Thoughts -- Chapter 12: The Never-Ending Race -- A Short Review of the Book -- Predictions -- The Future of Malware -- The Future of Rootkits -- The Future of Botnets -- The Good Guys Are Busy Too -- The Adventure Has Just Begun -- We've Covered -- Appendix A: The Bootup Process -- The Windows Bootup Process -- BIOS-Based system -- EFI-Based System -- Appendix B: Useful Links -- Vulnerability Information -- Free Online Security Products -- Free File Scanner and Analysis Tools -- Web Security -- Malware Trackers -- Other Important Links -- Glossary -- Index. 
520 |a Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get started protecting your network right away. Malware, Rootkits & Botnets: A Beginner's Guide features: Lingo --Common security terms defined so that you're in the know on the job IMHO --Frank and relevant opinions based on the author's years of industry experience Budget Note --Tips for getting security technologies and processes into your organization's budget In Actual Practice --Exceptions to the rules of security explained in real-world contexts Your Plan --Customizable checklists you can use on the job now Into Action --Tips on how, why, and when to apply new skills and techniques at work. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Malware (Computer software) 
650 0 |a Rootkits (Computer software) 
650 6 |a Sécurité informatique. 
650 6 |a Logiciels malveillants. 
650 6 |a Trousses administrateur pirate. 
650 7 |a Cyberspace  |x Security measures.  |2 fast  |0 (OCoLC)fst02031378 
650 7 |a Rootkits (Computer software)  |2 fast  |0 (OCoLC)fst01763670 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Malware (Computer software)  |2 fast  |0 (OCoLC)fst01748230 
700 1 |a Hypponen, Mikko. 
776 0 8 |i Print version:  |a Elisan, Christopher C.  |t Malware, rootkits & botnets.  |d New York. : McGraw-Hill, ©2013  |z 9780071792066  |w (OCoLC)795181561 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071792066/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 16840834 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24243713 
938 |a Books 24x7  |b B247  |n bks00050494 
938 |a Coutts Information Services  |b COUT  |n 24018974  |c 40.00 USD 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 389138 
994 |a 92  |b IZTAP