Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Hacking Exposed: Malware & Rootkits Secrets & Solutions 1st Edition

4.6 out of 5 stars 11 customer reviews
ISBN-13: 978-0071591188
ISBN-10: 0071591184
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$10.34 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$32.13 On clicking this link, a new layer will be open
More Buying Choices
29 New from $22.55 26 Used from $5.86

There is a newer edition of this item:

Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


The Amazon Book Review
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
$32.13 FREE Shipping. Only 4 left in stock (more on the way). Ships from and sold by Amazon.com. Gift-wrap available.
click to open popover

Frequently Bought Together

  • Hacking Exposed:  Malware & Rootkits Secrets & Solutions
  • +
  • Hacking Exposed 7: Network Security Secrets and Solutions
Total price: $58.49
Buy the selected items together

Editorial Reviews

About the Author

Michael A. Davis is CEO of Savid Technologies, Inc., a technology and security consulting firm. He has worked with McAfee, Inc., as senior manager of Global Threats. Michael is a member of the Honeynet Project.

Sean M. Bodmer is director of government programs at Savid Corporation, Inc. He is an active honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Sean works with the Honeynet Project and the Hacker Profiling Project.

Aaron LeMasters is a security researcher specializing in computer forensics, malware analysis, and vulnerability research. He spent five years defending the undefendable DoD networks and is now a senior software engineer at Raytheon SI.

NO_CONTENT_IN_FEATURE

The latest book club pick from Oprah
"The Underground Railroad" by Colson Whitehead is a magnificent novel chronicling a young slave's adventures as she makes a desperate bid for freedom in the antebellum South. See more

Product Details

  • Paperback: 400 pages
  • Publisher: McGraw-Hill Education; 1 edition (October 14, 2009)
  • Language: English
  • ISBN-10: 0071591184
  • ISBN-13: 978-0071591188
  • Product Dimensions: 7.5 x 0.8 x 9.2 inches
  • Shipping Weight: 1.4 pounds (View shipping rates and policies)
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (11 customer reviews)
  • Amazon Best Sellers Rank: #347,640 in Books (See Top 100 in Books)

Related Media

Customer Reviews

Top Customer Reviews

Format: Paperback
While the first reviewer didn't like the emphasis on Rootkits as opposed to also including more info on Malware, there are already plenty of books concerning Malware in my opinion.
The delivery mechanism (Rootkits) seems to be less exposed and known about in the general public.

This book deals more with actually locating, and removing Rootkits (within reason) where as many of the recently published Rootkit guides deal more with implementation and structuring of Rootkits.
For the above average computer user as well as IT professional, I would highly recommend this book. It's not written in laymans terms but even someone who is an avid computer user could pick up many useful tips from this read. If you have any dreams of getting into the computer security field or if you do computer security on the side, this is an absolute must have for your library.
The newest generation of crackers and black hats are quickly moving to the Rootkit delivery system because of it's totally stealth characteristics and fast deployment system rendering todays AV and Anti-Malware programs virtually useless to protect the end user.

Personally I'd recommend everyone get or read this book since Rootkits ARE the wave of the future without a doubt.
Comment 12 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Well, I am a "layperson" and found an abundance of interesting and informative material in this well written manual. A close relative works in the cyber security industry so I wanted to become conversant in the language and concepts of his day-to-day mission. Although some of the terms were "above my pay grade," I understood the material and learned far more than I ever have after reading online overviews of the same topics. I especially appreciated the chapters on anti-virus and host detections systems that explain the dynamic nature of the antivirus industry and ongoing programs designed to combat ever growing malicious threats. Our increasing dependence on computers dictate that we become more knowledgable about detecting malware, etc. This book certainly helped me undertand what I need to know and do to protect my computers!
Comment 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.

They are Great Books!! ---That is my opinion!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Well written. Thoroughly researched by technology security professionals. For those who needed to protect their computers and data systems, this is a good resource book to keep by our side. Stay alert. Do not execute your mails blindly. Threats comes by the moment you power up your computer.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book is succinct, yet detailed. It addresses the real-time emerging threat of not only malware and rootkits, but the individuals behind the development and deployment of them. They do a very good job of discussing possible countermeasures in each chapter which focus on specific issues and offer the common sense solutions which and IT professional should have no problem implementing. A friend recommended this to me, and I am glad he did!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
the book in great condition, and the information in it is valuable for people want to learn how to protect your computer system from Malware , and Root Kits.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Hacking Exposed:  Malware & Rootkits Secrets & Solutions
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: Hacking Exposed: Malware & Rootkits Secrets & Solutions