Dewey Decimal005.8
Table Of ContentChapter 1. Getting in Gear Chapter 2. A Brief History of Malware Chapter 3. Cloak of the Rootkit Chapter 4. Rise of the Botnets Chapter 5. The Threat Ecosystem Chapter 6. The Malware Factory Chapter 7. Infection Vectors Chapter 8. The Compromised System Chapter 9. Understanding Your System Chapter 10. Identifying a Possible Threat Chapter 11. Mitigating a Known Threat Chapter 12. The Never-Ending Race
SynopsisNew in the Secure Beginner's Guide series, this complete, practical resource for security and IT professionals explains the nature, sophistication, and danger of the leading type of network attack--malware, rootkit, and botnet threats--and the professional tasks essential to securing networks against such attacks., Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practicesfor thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get startedprotecting your network right away. Malware, Rootkits & Botnets: A Beginner's Guide features: Lingo --Common security terms defined so that you're in the know on the job IMHO --Frank and relevant opinions based on theauthor's years of industry experience Budget Note --Tips for getting security technologies and processes into your organization's budget In Actual Practice --Exceptions to the rules of security explained in real-world contexts Your Plan --Customizable checklists you can use on the job now Into Action --Tips on how, why, and when to applynew skills and techniques at work
LC Classification NumberQA76.9.A25