Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization

Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization
Author :
Publisher : БХВ-Петербург
Total Pages : 297
Release :
ISBN-10 : 9781931769594
ISBN-13 : 1931769591
Rating : 4/5 (94 Downloads)

Book Synopsis Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization by : Oleg Zaytsev

Download or read book Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization written by Oleg Zaytsev and published by БХВ-Петербург. This book was released on 2006 with total page 297 pages. Available in PDF, EPUB and Kindle. Book excerpt: Covering the wide range of technologies implemented by contemporary malware programs such as rootkits, keyloggers, spyware, adware, back doors, and network and mail worms, this practical guide for system administrators and experienced users covers approaches to computer investigation and how to locate and destroy malicious programs without using antiviral software. Examples such as protocol fragments, operating principles of contemporary malicious programs, and an overview of specialized software for finding and neutralizing malware are presented, and the accompanying CD-ROM includes programs for system analysis and an antiviral utility intended for investigating the system and detecting rootkits and keyloggers.


Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization Related Books

Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization
Language: en
Pages: 297
Authors: Oleg Zaytsev
Categories: Computers
Type: BOOK - Published: 2006 - Publisher: БХВ-Петербург

DOWNLOAD EBOOK

Covering the wide range of technologies implemented by contemporary malware programs such as rootkits, keyloggers, spyware, adware, back doors, and network and
Cybercrime
Language: en
Pages: 289
Authors: David Wall
Categories: Computers
Type: BOOK - Published: 2007-09-17 - Publisher: Polity

DOWNLOAD EBOOK

Looking at the full range of cybercrime, and computer security he shows how the increase in personal computing power available within a globalized communication
Malware Analyst's Cookbook and DVD
Language: en
Pages: 744
Authors: Michael Ligh
Categories: Computers
Type: BOOK - Published: 2010-09-29 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of mal
XSS Attacks
Language: en
Pages: 479
Authors: Seth Fogie
Categories: Computers
Type: BOOK - Published: 2011-04-18 - Publisher: Elsevier

DOWNLOAD EBOOK

A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing p
Wireless and Mobile Device Security
Language: en
Pages: 416
Authors: Jim Doherty
Categories: Business & Economics
Type: BOOK - Published: 2016 - Publisher: Jones & Bartlett Publishers

DOWNLOAD EBOOK

The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on their wireless devices in the workplace and in the home