Beginner\'s Guide - Elisan C.C. - Malware, Rootkits & Botnets [2013, PDF, ENG] 

Цитировать
Malware, Rootkits & Botnets
Год издания: 2013
Автор: Elisan C.C.
Издательство: McGraw-Hill Education
ISBN: 978-0071792066
Серия: Beginner's Guide
Язык: Английский
Формат: PDF
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Количество страниц: 432
Описание: Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them.
After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get started protecting your network right away.
Malware, Rootkits & Botnets: A Beginner's Guide features:
- Lingo--Common security terms defined so that you're in the know on the job
- IMHO--Frank and relevant opinions based on the author's years of industry experience
- Budget Note--Tips for getting security technologies and processes into your organization's budget
- In Actual Practice--Exceptions to the rules of security explained in real-world contexts
- Your Plan--Customizable checklists you can use on the job now
- Into Action--Tips on how, why, and when to apply new skills and techniques at work

Примеры страниц

Оглавление

Contents at a Glance
Part I Establishing the Foundation
1 Getting In Gear . 3
2 A Brief History of Malware . 9
3 Cloak of the Rootkit . 39
4 Rise of the Botnets 55
Part II Welcome to the Jungle
5 The Threat Ecosystem . 85
6 The Malware Factory . 113
7 Infection Vectors 155
8 The Compromised System 185
Part III The Enterprise Strikes Back
9 Protecting the Organization 213
10 Detecting the Threat 255
11 Mitigating the Threat . 273
PART IV Final Thoughts
12 The Never-ending Race . 297
A The Bootup Process . 307
B Useful Links . 311
Glossary . 315
Index 333
Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете голосовать в опросах
Вы не можете прикреплять файлы к сообщениям
Вы можете скачивать файлы
Sitemap