Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Malware & Rootkits

Buy
Hacking Exposed Malware & Rootkits, 9780071591188 (0071591184), McGraw-Hill, 2009

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been true. I remember when I first started in information security in 1998, deploying my first honeypots. These allowed me to watch attackers break into and take over real computers. I learned firsthand their tools and techniques. Back in those days, attackers began their attack by manually scanning entire network blocks. Their goal was to build a list of IP addresses that they could access on the Internet. After spending days building this database, they would return, probing common ports on each computer they found, looking for known vulnerabilities such as vulnerable FTP servers or open Window file shares. Once these vulnerabilities were found, the attackers would return to exploit the system. This whole process of probing and exploiting could take anywhere from several hours to several weeks and required different tools for each stage in the process. Once exploited, the attacker would upload additional tools, each of which had a unique purpose and usually ran manually. For example, one tool would clear out the logs; another tool would secure the system; another tool would retrieve passwords or scan for other vulnerable systems. You could often judge just how advanced the attacker was by the number of mistakes he or she made in running different tools or executing system commands. It was a fun and interesting time, as you could watch and learn from attackers and identify them and their motivations. It almost felt as if you could make a personal connection with the very people breaking into your computers.

(HTML tags aren't allowed.)

ZeroMQ
ZeroMQ

For C developers who want a comprehensive introduction to ZeroMQ, this is the perfect tutorial. With a user-friendly approach and practical examples, it covers everything from fundamental message patterns to working with multiple sockets.

Overview

  • Learn fundamental message/queue design patterns
  • ...
Practical Image and Video Processing Using MATLAB
Practical Image and Video Processing Using MATLAB

UP-TO-DATE, TECHNICALLY ACCURATE COVERAGE OF ESSENTIAL TOPICS IN IMAGE AND VIDEO PROCESSING

This is the first book to combine image and video processing with a practical MATLAB®-oriented approach in order to demonstrate the most important image and video techniques and algorithms. Utilizing minimal...

Android Arcade Game App: A Real World Project - Case Study Approach
Android Arcade Game App: A Real World Project - Case Study Approach
Welcome to Android Arcade Game App. In this book, you will learn how to create an Android arcade-style game “from project to publish.” While I will walk you through solutions to some gaming development problems, this book is not necessarily for beginner developers.

You chose this book because you are
...

Automation through Chef Opscode: A Hands-on Approach to Chef
Automation through Chef Opscode: A Hands-on Approach to Chef

Automation through Chef Opscode provides an in-depth understanding of Chef, which is written in Ruby and Erlang for configuration management, cloud infrastructure management, system administration, and network management.

Targeted at administrators, consultants, and architect, the book guides them through...

Proof and Disproof in Formal Logic: An Introduction for Programmers (Oxford Texts in Logic)
Proof and Disproof in Formal Logic: An Introduction for Programmers (Oxford Texts in Logic)
Proof and Disproof in Formal Logic is a lively and entertaining introduction to formal logic providing an excellent insight into how a simple logic works. Formal logic allows you to check a logical claim without considering what the claim means. This highly abstracted idea is an essential and practical part of computer science. The idea of a...
Beautiful Beasties: A Creative Guide to Modern Pet Photography
Beautiful Beasties: A Creative Guide to Modern Pet Photography

The book pet photographers have been waiting for: a comprehensive guide to professional modern pet photography

Everyone who has ever trained their camera on a domestic animal knows how challenging it can be to get great shots of them. These unpredictable 'beautiful beasties' won't hold poses, smile and say
...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy