Blending technical insights with real-world examples, the book outlines practical steps for identifying, analyzing, and defending against cyberattacks. Learn how attackers exploit rootkits to remain undetected, persist on compromised systems, and escalate privileges to gain control. You'll also discover essential tools for threat detection and building robust defenses to protect against these covert threats.
Through in-depth case studies like Stuxnet and CopyCat, this book showcases some of the most notorious cyberattacks and explores how ethical hackers can use this knowledge to not only defend systems but also responsibly disclose vulnerabilities to protect the digital world.
Whether you're new to cybersecurity or an experienced professional, The Silent Hands will enhance your skills and deepen your understanding of the invisible forces shaping our online lives.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.