Master your Minecraft
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Tour our stores


    Recently Viewed clear list


    Best Books of the Year | December 9, 2014

    Aubrey: IMG Best YA Fiction of 2014



    So what is with all the hullabaloo about young adult literature these days? Do we have John Green to blame for getting us sucked in to the tragic... Continue »

    spacer
Qualifying orders ship free.
$8.95
Used Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
1 Local Warehouse Networking- Computer Security

Malware: Fighting Malicious Code (Prentice Hall Series in Computer Networking and Distributed)

by

Malware: Fighting Malicious Code (Prentice Hall Series in Computer Networking and Distributed) Cover

 

Synopses & Reviews

Publisher Comments:

  • Reveals how attackers install malicious code and how they evade detection
  • Shows how you can defeat their schemes and keep your computers and network safe!
  • Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats
  • Explains how to handle today's threats, with an eye on handling the threats to come

"This is a truly outstanding book-enormous technical wealth and beautifully written."

—Warwick Ford

"Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!"

—Harlan Carvey, CISSP

"This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle."

—Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers

Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it!

This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes:

  • Solutions and examples that cover both UNIX® and Windows®
  • Practical, time-tested, real-world actions you can take to secure your systems
  • Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly!

Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home computer users, and anyone else interested in keeping their systems safe from attackers.

Book News Annotation:

Intended for system administrators, this security guide characterizes the latest wave of malicious code attacks being used to invade commercial computer systems based on Windows and UNIX—worms, mobile code on the web, backdoors, Trojan horses, and kernel-mode rootkits—recommends defenses to protect systems against each type of attack, and provides instructions for building an experimental network to analyze malicious code and the associated defenses.
Annotation 2004 Book News, Inc., Portland, OR (booknews.com)

Synopsis:

Malware is short for malicious software--software designed specifically to damage or disrupt a system, such as a virus or Trojan horse. Skoudis shows how to fight this malicious code.

About the Author

ED SKOUDIS is a computer security consultant with International Network Services. Ed's expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed secure network architectures, and responded to computer attacks. A frequent speaker on issues associated with hacker tools and effective defenses, Ed has published several articles, as well as the highly acclaimed Counter Attack: A Step-by-Step Guide to Computer Attacks and Effective Defenses (Prentice Hall PTR, 2001).

Table of Contents

Foreword.

Acknowledgments.

1. Introduction.

Defining the Problem. Why Is Malicious Code So Prevalent? Types of Malicious Code. Malicious Code History. Why This Book? What To Expect. References.

2. Viruses.

The Early History of Computer Viruses. Infection Mechanisms and Targets. Virus Propagation Mechanisms. Defending against Viruses. Malware Self-Preservation Techniques. Conclusions. Summary. References.

3. Worms.

Why Worms? A Brief History of Worms. Worm Components. Impediments to Worm Spread. The Coming Super Worms. Bigger Isn't Always Better: The Un-Super Worm. Worm Defenses. Conclusions. Summary. References.

4. Malicious Mobile Code.

Browser Scripts. ActiveX Controls. Java Applets. Mobile Code in E-Mail Clients. Distributed Applications and Mobile Code. Additional Defenses against Malicious Mobile Code. Conclusions. Summary. References.

5. Backdoors.

Different Kinds of Backdoor Access. Installing Backdoors. Starting Backdoors Automatically. All-Purpose Network Connection Gadget: Netcat. Network Computing. Backdoors without Ports. Conclusions. Summary. References.

6. Trojan Horses.

What's in a Name? Wrap Stars. Trojaning Software Distribution Sites. Poisoning the Source. Co-opting a Browser: Setiri. Hiding Data in Executables: Stego and Polymorphism. Conclusions. Summary. References.

7. User-Mode RootKits.

UNIX User-mode RootKits. Windows User-Mode RootKits. Conclusions. Summary. References.

8. Kernel-Mode RootKits.

What Is the Kernel? Kernel Manipulation Impact. The Linux Kernel. The Windows Kernel. Conclusions. Summary. References.

9. Going Deeper.

Setting the Stage: Different Layers of Malware. Going Deeper: The Possibility of BIOS and Malware Microcode. Combo Malware. Conclusions. Summary. References.

10. Scenarios.

Scenario 1: A Fly in the Ointment. Scenario 2: Invasion of the Kernel Snatchers. Scenario 3: Silence of the Worms. Conclusions. Summary.

11. Malware Analysis.

Building a Malware Analysis Laboratory. Malware Analysis Process. Conclusion. Summary. References.

12. Conclusion.

Useful Web Sites for Keeping Up. Parting Thoughts.

Index.

Product Details

ISBN:
9780131014053
With:
Zeltser, Lenny
Publisher:
Prentice Hall
With:
Zeltser, Lenny
Author:
Skoudis, Ed
Author:
Skoudis, Edward
Author:
Zeltser, Lenny
Location:
Upper Saddle River, NJ
Subject:
Networking - General
Subject:
Computer networks
Subject:
Computer crimes
Subject:
Computer security
Subject:
Security
Subject:
Security - General
Subject:
Internet - Security
Subject:
Networking-Computer Security
Copyright:
Edition Description:
Trade paper
Series:
Radia Perlman Series in Computer Networking and Security
Series Volume:
97/102
Publication Date:
November 2003
Binding:
TRADE PAPER
Grade Level:
Professional and scholarly
Language:
English
Illustrations:
Yes
Pages:
672
Dimensions:
19.99 in.

Other books you might like

  1. The TCP/Ip Guide New Hardcover $99.95
  2. Incident Response and Computer... Used Trade Paper $29.00
  3. The Official Samba-3 Howto and... Used Mass Market $5.95
  4. Inside Network Perimeter Security... New Trade Paper $49.99
  5. Higher-Order Perl
    New Trade Paper $104.88
  6. Red Hat Fedora Linux 3 Bible with DVD Sale Trade Paper $1.00

Related Subjects

Computers and Internet » Internet » General
Computers and Internet » Networking » Computer Security

Malware: Fighting Malicious Code (Prentice Hall Series in Computer Networking and Distributed) Used Trade Paper
0 stars - 0 reviews
$8.95 In Stock
Product details 672 pages Prentice Hall PTR - English 9780131014053 Reviews:
"Synopsis" by , Malware is short for malicious software--software designed specifically to damage or disrupt a system, such as a virus or Trojan horse. Skoudis shows how to fight this malicious code.

spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.