New in the Secure Beginner's Guide series, this complete, practical resource for security and IT professionals explains the nature, sophistication, and danger of the leading type of network attack--malware, rootkit, and botnet threats--and the professional tasks essential to securing networks against such attacks.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practicesfor thwarting them.
After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get startedprotecting your network right away.
Malware, Rootkits & Botnets: A Beginner's Guidefeatures:
- Lingo--Common security terms defined so that you're in the know on the job
- IMHO--Frank and relevant opinions based on theauthor's years of industry experience
- Budget Note--Tips for getting security technologies and processes into your organization's budget
- In Actual Practice--Exceptions to the rules of security explained in real-world contexts
- Your Plan--Customizable checklists you can use on the job now
- Into Action--Tips on how, why, and when to applynew skills and techniques at work
Inhaltsverzeichnis
Chapter 1. Getting in Gear
Chapter 2. A Brief History of Malware
Chapter 3. Cloak of the Rootkit
Chapter 4. Rise of the Botnets
Chapter 5. The Threat Ecosystem
Chapter 6. The Malware Factory
Chapter 7. Infection Vectors
Chapter 8. The Compromised System
Chapter 9. Understanding Your System
Chapter 10. Identifying a Possible Threat
Chapter 11. Mitigating a Known Threat
Chapter 12. The Never-Ending Race