ExtraTorrent.ee - The Largest Bittorent System

ExtraTorrent.ee > Categories > Books torrents > Educational torrents

Browse Books torrents

Malware, Rootkits & Botnets A Beginners Guide by Christopher C. Elisan - pdf - zeke23 torrent


Download torrent: Malware, Rootkits & Botnets A Beginners Guide by Christopher C. Elisan - pdf - zeke23 torrent
Category: Categories > Books torrents > Educational torrents
Trackers:
8    View all torrent trackers >
Seeds: 65
Leechers: 7
Health:
Torrent language: English English
Total Size: 44.79 MB
Number of files:
1     View torrent files >
Uploader: zeke23
Torrent added: 2016-02-06 15:55:21





Torrent Description
1114430.jpg

Malware, Rootkits & Botnets A Beginner's Guide
by Christopher C. Elisan
English | 2012 | ISBN: 0071792066 | 432 Pages | PDF | 44,7 MB

Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them.

After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get started protecting your network right away.

Malware, Rootkits & Botnets: A Beginner's Guide features:

Lingo�CCommon security terms defined so that you're in the know on the job
IMHO�CFrank and relevant opinions based on the author's years of industry experience
Budget Note�CTips for getting security technologies and processes into your organization's budget
In Actual Practice�CExceptions to the rules of security explained in real-world contexts
Your Plan�CCustomizable checklists you can use on the job now
Into Action�CTips on how, why, and when to apply new skills and techniques at work

Some Useful Security Resources Mentioned in the Book:

Windows Sysinternals Security Utilities
GMER Rootkit Detector & Remover
Memoryze memory forensic software
TCPView Network Communications monitoring tool
Wireshark Malware Network behavior analysis tool
Ranking for Security Conferences
National Vulnerability Database





Comments 
No comments