1 / 401
文档名称:

McGraw.Hill.Hacking.Exposed.Malware.Rootkits.Sep.2009.pdf

格式:pdf   页数:401
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

McGraw.Hill.Hacking.Exposed.Malware.Rootkits.Sep.2009.pdf

上传人:kuo08091 2014/1/14 文件大小:0 KB

下载得到文件列表

McGraw.Hill.Hacking.Exposed.Malware.Rootkits.Sep.2009.pdf

文档介绍

文档介绍:Hacking Exposed™ Malware & Rootkits Reviews
“Accessible but not dumbed-down, this latest addition to the Hacking Exposed
series is a stellar example of why this series remains one of the best-selling security
franchises out there. System administrators and Average puter users alike
need e to grips with the sophistication and stealth of modern malware, and
this book calmly and clearly explains the threat.”
—Brian Krebs,
Reporter for The Washington Post and author of the Security Fix Blog
“A harrowing guide to where the bad guys hide, and how you can find them.”
—Dan Kaminsky,
Director of ration Testing, IOActive, Inc.
“The authors tackle malware, a deep and diverse issue puter security,
mon terms and relevant examples. Malware is a cold deadly tool in
hacking; the authors address it openly, showing its capabilities with direct technical
insight. The result is a good read that moves quickly, filling in the gaps even for the
knowledgeable reader.”
—Christopher Jordan,
VP, Threat Intelligence, McAfee; Principal Investigator to DHS Research
“Remember the end-of-semester review sessions where the instructor would go
wnload from Wow! eBook <> over everything from the whole term in just enough detail so you would
o
D understand all the key points, but also leave you with enough references to dig
deeper where you wanted? Hacking Exposed Malware & Rootkits resembles this! A
top-notch reference for novices and security professionals alike, this book provides
just enough detail to explain the topics being presented, but not too much to
dissuade those new to security.”
—LTC Ron Dodge,
. Army
“Hacking Exposed Malware & Rootkits provides unique insights into the
techniques behind malware and rootkits. If you are responsible for security, you
must read this book!”
—Matt Conover,
Senior Principal Software Engineer, Symantec Research Labs
This page intentionally left blank
HACKING EXPOSED™
MALWARE