Malware, Rootkits & Botnets A Beginner's Guide
26%
off

Malware, Rootkits & Botnets A Beginner's Guide

By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 3 business days
When will my order arrive?

Description

Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices
for thwarting them.

After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get started
protecting your network right away.

Malware, Rootkits & Botnets: A Beginner's Guide
features:Lingo--Common security terms defined so that you're in the know on the job
IMHO--Frank and relevant opinions based on the
author's years of industry experience
Budget Note--Tips for getting security technologies and processes into your organization's budget
In Actual Practice--Exceptions to the rules of security explained in real-world contexts
Your Plan--Customizable checklists you can use on the job now
Into Action--Tips on how, why, and when to apply
new skills and techniques at work
show more

Product details

  • Paperback | 432 pages
  • 185.42 x 228.6 x 25.4mm | 703.06g
  • McGraw-Hill Education - Europe
  • Osborne/McGraw-Hill
  • New York, United States
  • English
  • ill
  • 0071792066
  • 9780071792066
  • 498,590

About Christopher C. Elisan

Christopher C. Elisan, a seasoned reverse engineer and malware researcher, is the principal malware scientist at RSA NetWitness. He frequently contributes expert opinion about malware, botnets, and advance persistent threats for leading publications, including USA Today, InformationWeek, and Dark Reading.
show more

Table of contents

Chapter 1. Getting in Gear
Chapter 2. A Brief History of Malware
Chapter 3. Cloak of the Rootkit
Chapter 4. Rise of the Botnets
Chapter 5. The Threat Ecosystem
Chapter 6. The Malware Factory
Chapter 7. Infection Vectors
Chapter 8. The Compromised System
Chapter 9. Understanding Your System
Chapter 10. Identifying a Possible Threat
Chapter 11. Mitigating a Known Threat
Chapter 12. The Never-Ending Race
show more