Qty:1
  • List Price: $57.00
  • Save: $19.97 (35%)
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
FREE Shipping on orders over $35.
Used: Very Good | Details
Sold by bookoutlet1
Condition: Used: Very Good
Comment: Eligible for FREE Super Saving Shipping! Unread Copy in excellent condition. Has a publisher overstock mark.
Access codes and supplements are not guaranteed with used items.
Sell yours for a Gift Card
We'll buy it for $2.00
Learn More
Trade in now
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hacking Exposed: Malware & Rootkits Secrets & Solutions Paperback – September 23, 2009

ISBN-13: 978-0071591188 ISBN-10: 0071591184 Edition: 1st

Buy New
Price: $37.03
26 New from $27.85 20 Used from $14.90
Amazon Price New from Used from
Paperback
"Please retry"
$37.03
$27.85 $14.90

There is a newer edition of this item:

Year-End%20Deals%20in%20Books

Frequently Bought Together

Hacking Exposed:  Malware & Rootkits Secrets & Solutions + Hacking Exposed 7: Network Security Secrets &Amp; Solutions (Hacking Exposed: Network Security Secrets & Solutions)
Price for both: $68.39

Buy the selected items together
NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 400 pages
  • Publisher: McGraw-Hill Osborne Media; 1 edition (September 23, 2009)
  • Language: English
  • ISBN-10: 0071591184
  • ISBN-13: 978-0071591188
  • Product Dimensions: 7.5 x 0.8 x 9.2 inches
  • Shipping Weight: 1.4 pounds (View shipping rates and policies)
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (9 customer reviews)
  • Amazon Best Sellers Rank: #140,056 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Michael A. Davis is CEO of Savid Technologies, Inc., a technology and security consulting firm. He has worked with McAfee, Inc., as senior manager of Global Threats. Michael is a member of the Honeynet Project.

Sean M. Bodmer is director of government programs at Savid Corporation, Inc. He is an active honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Sean works with the Honeynet Project and the Hacker Profiling Project.

Aaron LeMasters is a security researcher specializing in computer forensics, malware analysis, and vulnerability research. He spent five years defending the undefendable DoD networks and is now a senior software engineer at Raytheon SI.


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Related Media


Customer Reviews

4.6 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

11 of 13 people found the following review helpful By William Scarbrough on December 22, 2009
Format: Paperback
While the first reviewer didn't like the emphasis on Rootkits as opposed to also including more info on Malware, there are already plenty of books concerning Malware in my opinion.
The delivery mechanism (Rootkits) seems to be less exposed and known about in the general public.

This book deals more with actually locating, and removing Rootkits (within reason) where as many of the recently published Rootkit guides deal more with implementation and structuring of Rootkits.
For the above average computer user as well as IT professional, I would highly recommend this book. It's not written in laymans terms but even someone who is an avid computer user could pick up many useful tips from this read. If you have any dreams of getting into the computer security field or if you do computer security on the side, this is an absolute must have for your library.
The newest generation of crackers and black hats are quickly moving to the Rootkit delivery system because of it's totally stealth characteristics and fast deployment system rendering todays AV and Anti-Malware programs virtually useless to protect the end user.

Personally I'd recommend everyone get or read this book since Rootkits ARE the wave of the future without a doubt.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 5 people found the following review helpful By EarthMother on November 23, 2010
Format: Paperback
Well, I am a "layperson" and found an abundance of interesting and informative material in this well written manual. A close relative works in the cyber security industry so I wanted to become conversant in the language and concepts of his day-to-day mission. Although some of the terms were "above my pay grade," I understood the material and learned far more than I ever have after reading online overviews of the same topics. I especially appreciated the chapters on anti-virus and host detections systems that explain the dynamic nature of the antivirus industry and ongoing programs designed to combat ever growing malicious threats. Our increasing dependence on computers dictate that we become more knowledgable about detecting malware, etc. This book certainly helped me undertand what I need to know and do to protect my computers!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Yit-Koi Lam on April 23, 2013
Format: Paperback Verified Purchase
Well written. Thoroughly researched by technology security professionals. For those who needed to protect their computers and data systems, this is a good resource book to keep by our side. Stay alert. Do not execute your mails blindly. Threats comes by the moment you power up your computer.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback
This book is succinct, yet detailed. It addresses the real-time emerging threat of not only malware and rootkits, but the individuals behind the development and deployment of them. They do a very good job of discussing possible countermeasures in each chapter which focus on specific issues and offer the common sense solutions which and IT professional should have no problem implementing. A friend recommended this to me, and I am glad he did!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By nada farhat on June 2, 2014
Format: Paperback Verified Purchase
the book in great condition, and the information in it is valuable for people want to learn how to protect your computer system from Malware , and Root Kits.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again