Malware, Rootkits & Botnets

Malware, Rootkits & Botnets : A Beginner's Guide

By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?


Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practicesfor thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get startedprotecting your network right away.Malware, Rootkits & Botnets: A Beginner's Guidefeatures: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on theauthor's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to applynew skills and techniques at workshow more

Product details

  • Paperback | 432 pages
  • 185.42 x 228.6 x 25.4mm | 703.06g
  • McGraw-Hill Education - Europe
  • Osborne/McGraw-Hill
  • New York, United States
  • English
  • ill
  • 0071792066
  • 9780071792066
  • 607,625

About Christopher C. Elisan

Christopher C. Elisan, a seasoned reverse engineer and malware researcher, is the principal malware scientist at RSA NetWitness. He frequently contributes expert opinion about malware, botnets, and advance persistent threats for leading publications, including USA Today, InformationWeek, and Dark more

Table of contents

Chapter 1. Getting in Gear Chapter 2. A Brief History of Malware Chapter 3. Cloak of the Rootkit Chapter 4. Rise of the Botnets Chapter 5. The Threat Ecosystem Chapter 6. The Malware Factory Chapter 7. Infection Vectors Chapter 8. The Compromised System Chapter 9. Understanding Your System Chapter 10. Identifying a Possible Threat Chapter 11. Mitigating a Known Threat Chapter 12. The Never-Ending Raceshow more