An electronic copy of book is available for Library Members Sign in to view the book
This practical security guide focuses on malware and rootkit threats, explaining how modern malicious software is designed, deployed, concealed, and defended against. Written by experienced security professionals, the book follows the well-known Hacking Exposed methodology, presenting attacks from the attacker’s perspective while pairing each technique with effective countermeasures. It covers malware analysis, rootkit installation and stealth techniques, kernel-level attacks, botnets, browser-based malware, and advanced persistence mechanisms, along with detection, incident response, and remediation strategies. The book is aimed at security professionals, penetration testers, system administrators, and advanced students seeking real-world defensive knowledge against sophisticated malware threats.
Sub Title:
Edition:
Volume:
Publisher: McGraw-Hill/Osborne
Publishing Year: 2010
ISBN: 9780071626750
Pages: 432