Compartir
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition (en Inglés)
Michael Davis
(Autor)
·
Christopher Elisan
(Autor)
·
Sean Bodmer
(Autor)
·
McGraw-Hill Companies
· Tapa Blanda
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition (en Inglés) - Elisan, Christopher ; Davis, Michael ; Bodmer, Sean
$ 1,278.18
$ 2,130.30
Ahorras: $ 852.12
Elige la lista en la que quieres agregar tu producto o crea una nueva lista
✓ Producto agregado correctamente a la lista de deseos.
Ir a Mis Listas
Origen: Estados Unidos
(Costos de importación incluídos en el precio)
Se enviará desde nuestra bodega entre el
Viernes 24 de Mayo y el
Jueves 06 de Junio.
Lo recibirás en cualquier lugar de México entre 1 y 3 días hábiles luego del envío.
Reseña del libro "Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition (en Inglés)"
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed(TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.- Learn how malware infects, survives, and propagates across an enterprise- See how hackers develop malicious code and target vulnerable systems- Detect, neutralize, and remove user-mode and kernel-mode rootkits - Use hypervisors and honeypots to uncover and kill virtual rootkits- Defend against keylogging, redirect, click fraud, and identity theft- Block spear phishing, client-side, and embedded-code exploits- Effectively deploy the latest antivirus, pop-up blocker, and firewall software- Identify and stop malicious processes using IPS solutions