Boek
Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Understand how malware infects, survives, and propagates across an enterpriseLearn how hackers use archivers, encryptors, and packers to obfuscate codeImplement effective intrusion detection and prevention proceduresDefend against keylogging, redirect, click fraud, and identity theft threatsDetect, kill, and remove virtual, user-mode, and kernel-mode rootkits Prevent malicious website, phishing, client-side, and embedded-code exploitsProtect hosts using the latest antivirus, pop-up blocker, and firewall softwareIdentify and terminate malicious processes using HIPS and NIPS «
Boeklezers.nl is een netwerk voor sociaal lezen. Wij helpen lezers nieuwe boeken en schrijvers ontdekken, en brengen lezers met elkaar en schrijvers in contact. Meer lezen »
Er zijn nog geen recensies voor dit boek.