Qty:1
  • List Price: $57.00
  • Save: $18.92 (33%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Hacking Exposed: Malware... has been added to your Cart
Condition: Used: Like New
Comment: SHIPS DIRECTLY FROM AMAZON. Book is sharp with only minor wear. Has a publisher's remainder mark.
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Hacking Exposed: Malware & Rootkits Secrets & Solutions Paperback – September 23, 2009

10 customer reviews
ISBN-13: 978-0071591188 ISBN-10: 0071591184 Edition: 1st

Buy New
Price: $38.08
38 New from $12.20 52 Used from $1.75
Amazon Price New from Used from
Paperback
"Please retry"
$38.08
$12.20 $1.75

There is a newer edition of this item:

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Hero Quick Promo
Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now
$38.08 FREE Shipping. Only 1 left in stock (more on the way). Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

Hacking Exposed:  Malware & Rootkits Secrets & Solutions + Hacking Exposed Web Applications, Third Edition
Price for both: $77.17

Buy the selected items together

Editorial Reviews

About the Author

Michael A. Davis is CEO of Savid Technologies, Inc., a technology and security consulting firm. He has worked with McAfee, Inc., as senior manager of Global Threats. Michael is a member of the Honeynet Project.

Sean M. Bodmer is director of government programs at Savid Corporation, Inc. He is an active honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Sean works with the Honeynet Project and the Hacker Profiling Project.

Aaron LeMasters is a security researcher specializing in computer forensics, malware analysis, and vulnerability research. He spent five years defending the undefendable DoD networks and is now a senior software engineer at Raytheon SI.

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 400 pages
  • Publisher: McGraw-Hill Education; 1 edition (September 23, 2009)
  • Language: English
  • ISBN-10: 0071591184
  • ISBN-13: 978-0071591188
  • Product Dimensions: 7.5 x 0.8 x 9.2 inches
  • Shipping Weight: 1.4 pounds (View shipping rates and policies)
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (10 customer reviews)
  • Amazon Best Sellers Rank: #301,522 in Books (See Top 100 in Books)

Related Media


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

11 of 13 people found the following review helpful By William Scarbrough on December 22, 2009
Format: Paperback
While the first reviewer didn't like the emphasis on Rootkits as opposed to also including more info on Malware, there are already plenty of books concerning Malware in my opinion.
The delivery mechanism (Rootkits) seems to be less exposed and known about in the general public.

This book deals more with actually locating, and removing Rootkits (within reason) where as many of the recently published Rootkit guides deal more with implementation and structuring of Rootkits.
For the above average computer user as well as IT professional, I would highly recommend this book. It's not written in laymans terms but even someone who is an avid computer user could pick up many useful tips from this read. If you have any dreams of getting into the computer security field or if you do computer security on the side, this is an absolute must have for your library.
The newest generation of crackers and black hats are quickly moving to the Rootkit delivery system because of it's totally stealth characteristics and fast deployment system rendering todays AV and Anti-Malware programs virtually useless to protect the end user.

Personally I'd recommend everyone get or read this book since Rootkits ARE the wave of the future without a doubt.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 5 people found the following review helpful By EarthMother on November 23, 2010
Format: Paperback
Well, I am a "layperson" and found an abundance of interesting and informative material in this well written manual. A close relative works in the cyber security industry so I wanted to become conversant in the language and concepts of his day-to-day mission. Although some of the terms were "above my pay grade," I understood the material and learned far more than I ever have after reading online overviews of the same topics. I especially appreciated the chapters on anti-virus and host detections systems that explain the dynamic nature of the antivirus industry and ongoing programs designed to combat ever growing malicious threats. Our increasing dependence on computers dictate that we become more knowledgable about detecting malware, etc. This book certainly helped me undertand what I need to know and do to protect my computers!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Yit-Koi Lam on April 23, 2013
Format: Paperback Verified Purchase
Well written. Thoroughly researched by technology security professionals. For those who needed to protect their computers and data systems, this is a good resource book to keep by our side. Stay alert. Do not execute your mails blindly. Threats comes by the moment you power up your computer.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback
This book is succinct, yet detailed. It addresses the real-time emerging threat of not only malware and rootkits, but the individuals behind the development and deployment of them. They do a very good job of discussing possible countermeasures in each chapter which focus on specific issues and offer the common sense solutions which and IT professional should have no problem implementing. A friend recommended this to me, and I am glad he did!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.

They are Great Books!! ---That is my opinion!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Hacking Exposed:  Malware & Rootkits Secrets & Solutions
This item: Hacking Exposed: Malware & Rootkits Secrets & Solutions
Price: $38.08
Ships from and sold by Amazon.com

Want to discover more products? Check out this page to see more: best hacking software