Qty:1
  • List Price: $54.00
  • Save: $27.00 (50%)
FREE Shipping on orders over $35.
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
FREE Shipping on orders over $35.
Used: Very Good | Details
Sold by bookoutlet1
Condition: Used: Very Good
Comment: Eligible for FREE Super Saving Shipping! Unread Copy in excellent condition. Has a publisher overstock mark.
Access codes and supplements are not guaranteed with used items.
Add to Cart
Trade in your item
Get a $2.00
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hacking Exposed: Malware & Rootkits Secrets & Solutions Paperback – October 14, 2009

ISBN-13: 978-0071591188 ISBN-10: 0071591184 Edition: 1st

Buy New
Price: $27.00
37 New from $26.13 26 Used from $5.56
Amazon Price New from Used from
Paperback
"Please retry"
$27.00
$26.13 $5.56

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student




Frequently Bought Together

Hacking Exposed:  Malware & Rootkits Secrets & Solutions + HACKING EXPOSED WEB APPLICATIONS, 3rd Edition + Hacking Exposed 7: Network Security Secrets &Amp; Solutions (Hacking Exposed: Network Security Secrets & Solutions)
Price for all three: $89.70

Buy the selected items together

NO_CONTENT_IN_FEATURE

Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Paperback: 400 pages
  • Publisher: McGraw-Hill Osborne Media; 1 edition (October 14, 2009)
  • Language: English
  • ISBN-10: 0071591184
  • ISBN-13: 978-0071591188
  • Product Dimensions: 9.7 x 7.4 x 0.8 inches
  • Shipping Weight: 1.4 pounds (View shipping rates and policies)
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (9 customer reviews)
  • Amazon Best Sellers Rank: #1,042,593 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Michael A. Davis is CEO of Savid Technologies, Inc., a technology and security consulting firm. He has worked with McAfee, Inc., as senior manager of Global Threats. Michael is a member of the Honeynet Project.

Sean M. Bodmer is director of government programs at Savid Corporation, Inc. He is an active honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Sean works with the Honeynet Project and the Hacker Profiling Project.

Aaron LeMasters is a security researcher specializing in computer forensics, malware analysis, and vulnerability research. He spent five years defending the undefendable DoD networks and is now a senior software engineer at Raytheon SI.


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Related Media


Customer Reviews

4.6 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

11 of 13 people found the following review helpful By William Scarbrough on December 22, 2009
Format: Paperback
While the first reviewer didn't like the emphasis on Rootkits as opposed to also including more info on Malware, there are already plenty of books concerning Malware in my opinion.
The delivery mechanism (Rootkits) seems to be less exposed and known about in the general public.

This book deals more with actually locating, and removing Rootkits (within reason) where as many of the recently published Rootkit guides deal more with implementation and structuring of Rootkits.
For the above average computer user as well as IT professional, I would highly recommend this book. It's not written in laymans terms but even someone who is an avid computer user could pick up many useful tips from this read. If you have any dreams of getting into the computer security field or if you do computer security on the side, this is an absolute must have for your library.
The newest generation of crackers and black hats are quickly moving to the Rootkit delivery system because of it's totally stealth characteristics and fast deployment system rendering todays AV and Anti-Malware programs virtually useless to protect the end user.

Personally I'd recommend everyone get or read this book since Rootkits ARE the wave of the future without a doubt.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 4 people found the following review helpful By EarthMother on November 23, 2010
Format: Paperback
Well, I am a "layperson" and found an abundance of interesting and informative material in this well written manual. A close relative works in the cyber security industry so I wanted to become conversant in the language and concepts of his day-to-day mission. Although some of the terms were "above my pay grade," I understood the material and learned far more than I ever have after reading online overviews of the same topics. I especially appreciated the chapters on anti-virus and host detections systems that explain the dynamic nature of the antivirus industry and ongoing programs designed to combat ever growing malicious threats. Our increasing dependence on computers dictate that we become more knowledgable about detecting malware, etc. This book certainly helped me undertand what I need to know and do to protect my computers!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Yit-Koi Lam on April 23, 2013
Format: Paperback Verified Purchase
Well written. Thoroughly researched by technology security professionals. For those who needed to protect their computers and data systems, this is a good resource book to keep by our side. Stay alert. Do not execute your mails blindly. Threats comes by the moment you power up your computer.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By nada farhat on June 2, 2014
Format: Paperback Verified Purchase
the book in great condition, and the information in it is valuable for people want to learn how to protect your computer system from Malware , and Root Kits.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.

They are Great Books!! ---That is my opinion!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search