Skip Navigation
List Price: $68.17

Rent Book

Select for Price
Add to Cart Free Shipping
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

Malware, Rootkits & Botnets A Beginner's Guide,9780071792066

Malware, Rootkits & Botnets A Beginner's Guide

Edition: 1st
Format: Paperback
Pub. Date: 9/18/2012
Publisher(s): McGraw-Hill Education
Availability: This title is currently not available.


Security smarts for the self-guided IT professional Malware, Rootkits & Botnets: A Beginner's Guideexplains the nature, sophistication, and danger of malware, rootkit, and botnet threats-and the tasks essential to securing networks against such attacks.A complete, practical resource for security and IT professionals, the book imparts the hard-learned lessons and experiences of a respected, high-profile industry analyst, and provides know-how that may otherwise take years to learn. You'll go from a professional-beginner level to an up-and-running level of proficiency. This comprehensive guide explains the role of malware, rootkits, and botnets in the context of their early constructions and new sophistications, discussing the groups that develop and deploy malware. The book reveals the smartest techniques and most effective tools security professionals use to identify, defend, and remove malware, rootkits, and botnets from all sizes of computer networks. You'll get an actionable, rock-solid foundation in understanding and defending networks from malware, rootkits, and botnets-from a full overview of the most effective solutions to best practices for detecting vulnerabilities and assessing threats. Malware, Rootkits & Botnets: A Beginner's Guidefeatures: Lingo-Common security terms defined so that you're in the know on the job IMHO-Frank and relevant opinions based on the author's years of industry experience Budget Note-Tips for getting security technologies and processes into your organization's budget In Actual Practice-Exceptions to the rules of security explained in real-world contexts Your Plan-Customizable checklists you can use on the job now Into Action-Tips on how, why, and when to apply new skills and techniques at work Step-by-step coverage: Brief History of Malware; Cloak of the Rootkit; Rise of the Botnets; The Threat Ecosystem; The Malware Factory; Infection Vectors; The Compromised System; Understanding Your System; Identifying a Possible Threat; Mitigating a Known Threat

Table of Contents

Chapter 1. Getting in Gear
Chapter 2. A Brief History of Malware
Chapter 3. Cloak of the Rootkit
Chapter 4. Rise of the Botnets
Chapter 5. The Threat Ecosystem
Chapter 6. The Malware Factory
Chapter 7. Infection Vectors
Chapter 8. The Compromised System
Chapter 9. Understanding Your System
Chapter 10. Identifying a Possible Threat
Chapter 11. Mitigating a Known Threat
Chapter 12. The Never-Ending Race

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.

American Express