Cargando…

Hacking exposed : malware and rootkits : security secrets & solutions /

Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed"!Malware and Rootkits: Security Secrets &am...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Davis, Michael, 1982- (Autor), Elisan, Christopher C. (Autor), Bodmer, Sean (Autor), LeMasters, Aaron (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, [2017]
Edición:Second edition.
Colección:Hacking Exposed Ser.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn968714981
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 170116s2017 nyua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCA  |d TOH  |d C6I  |d EBLCP  |d OCLCO  |d CZL  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1164495312 
020 |a 9780071825757 
020 |a 0071825754 
020 |z 9780071823074 
029 1 |a AU@  |b 000069005702 
035 |a (OCoLC)968714981  |z (OCoLC)1164495312 
037 |a CL0500000818  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Davis, Michael,  |d 1982-  |e author. 
245 1 0 |a Hacking exposed :  |b malware and rootkits : security secrets & solutions /  |c Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters. 
250 |a Second edition. 
264 1 |a New York :  |b McGraw-Hill Education,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Hacking Exposed Ser. 
500 |a Includes index. 
588 0 |a Online resource; title from title page (viewed January 13, 2017). 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I Malware -- CASE STUDY: Please Review This Before Our Quarterly Meeting -- 1 Malware Propagation -- Malware Is Still King -- The Spread of Malware -- Why They Want Your Workstation -- Intent Is Hard to Detect -- It's a Business -- Significant Malware Propagation Techniques -- Social Engineering -- File Execution -- Modern Malware Propagation Techniques -- StormWorm -- Metamorphism -- Obfuscation -- Dynamic Domain Name Services -- Fast Flux 
505 8 |a Malware Propagation Injection Vectors -- Email -- Malicious Websites -- Phishing -- Peer-to-Peer (P2P) -- Worms -- Summary -- 2 Malware Functionality -- What Malware Does Once It's Installed -- Pop-ups -- Search Engine Redirection -- Data Theft -- Click Fraud -- Identity Theft -- Keylogging -- Malware Behaviors -- Identifying Installed Malware -- Typical Install Locations -- Installing on Local Drives -- Modifying Timestamps -- Affecting Processes -- Disabling Services -- Modifying the Windows Registry -- Summary -- Part II Rootkits 
505 8 |a CASE STUDY: The Invisible Rootkit That Steals Your Bank Account Data -- Disk Access -- Firewall Bypassing -- Backdoor Communication -- Intent -- Presence and Significance -- 3 User-Mode Rootkits -- Rootkits -- Timeline -- Major Features of Rootkits -- Types of Rootkits -- User-Mode Rootkits -- What Are User-Mode Rootkits? -- Background Technologies -- Injection Techniques -- Hooking Techniques -- User-Mode Rootkit Examples -- Summary -- 4 Kernel-Mode Rootkits -- Ground Level: x86 Architecture Basics -- Instruction Set Architectures and the Operating System -- Protection Rings 
505 8 |a Bridging the Rings -- Kernel Mode: The Digital Wild West -- The Target: Windows Kernel Components -- The Win32 Subsystem -- What Are These APIs Anyway? -- The Concierge: NTDLL. DLL -- Functionality by Committee: The Windows Executive (NTOSKRNL. EXE) -- The Windows Kernel (NTOSKRNL. EXE) -- Device Drivers -- The Windows Hardware Abstraction Layer (HAL) -- Kernel Driver Concepts -- Kernel-Mode Driver Architecture -- Gross Anatomy: A Skeleton Driver -- WDF, KMDF, and UMDF -- Kernel-Mode Rootkits -- What Are Kernel-Mode Rootkits? -- Challenges Faced by Kernel-Mode Rootkits -- Methods and Techniques 
505 8 |a Kernel-Mode Rootkit Samples -- Klog by Clandestiny -- AFX by Aphex -- FU and FUTo by Jamie Butler, Peter Silberman, and C.H.A.O.S -- Shadow Walker by Sherri Sparks and Jamie Butler -- He4Hook by He4 Team -- Sebek by The Honeynet Project -- Summary -- Summary of Countermeasures -- 5 Virtual Rootkits -- Overview of Virtual Machine Technology -- Types of Virtual Machines -- The Hypervisor -- Virtualization Strategies -- Virtual Memory Management -- Virtual Machine Isolation -- Virtual Machine Rootkit Techniques -- Rootkits in the Matrix: How Did We Get Here?! -- What Is a Virtual Rootkit? 
520 |a Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed"!Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology." Learn how malware infects, survives, and propagates across an enterprise " See how hackers develop malicious code and target vulnerable systems " Detect, neutralize, and remove user-mode and kernel-mode rootkits " Use hypervisors and honeypots to uncover and kill virtual rootkits " Defend against keylogging, redirect, click fraud, and identity theft " Block spear phishing, client-side, and embedded-code exploits " Effectively deploy the latest antivirus, pop-up blocker, and firewall software " Identify and stop malicious processes using IPS solutions 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Malware (Computer software) 
650 0 |a Rootkits (Computer software) 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Logiciels malveillants. 
650 6 |a Trousses administrateur pirate. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Malware (Computer software)  |2 fast 
650 7 |a Rootkits (Computer software)  |2 fast 
700 1 |a Elisan, Christopher C.,  |e author. 
700 1 |a Bodmer, Sean,  |e author. 
700 1 |a LeMasters, Aaron,  |e author. 
776 0 8 |i Print version:  |a Elisan, Christopher C.  |t Hacking Exposed Malware and Rootkits: Security Secrets and Solutions, Second Edition.  |d : McGraw-Hill Education, ©2016 
830 0 |a Hacking Exposed Ser. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071825757/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6258127 
994 |a 92  |b IZTAP