Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code
Paperback

Trojans, Worms, and Spyware: A Computer Security Professional’s Guide to Malicious Code

$77.95
Sign in or become a Readings Member to add this title to your wishlist.

Preface Dedication Acknowledgements Introduction

Chapter One: Ma licious Code Overview Why Malicious Code Attacks are Danger ous The Impact of Malicious Code Attacks on Corporate Secur ity Why Malicious Code Attacks Work Flaws in S oftware
Weaknesses in System and Network Configurations Social Engineering Human Error and FoolishnessHackers, Thieves, and Spies Action Steps to Com bat Malicious Code Attacks

Chapter Two: Types of Malicious Code Email Viruses Trojans Back Doors Worms Blended Threats Time Bombs Spy Ware Ad Ware Steal Ware
Action Steps to Combat Malicious Code Attack s

Chapter Three: Review of Mali cious Code Incidents Historic Tidbits The Morr is Worm Melissa Love Bug Code Red

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Paperback
Publisher
Elsevier Science & Technology
Country
United Kingdom
Date
21 September 2004
Pages
232
ISBN
9780750678483

Preface Dedication Acknowledgements Introduction

Chapter One: Ma licious Code Overview Why Malicious Code Attacks are Danger ous The Impact of Malicious Code Attacks on Corporate Secur ity Why Malicious Code Attacks Work Flaws in S oftware
Weaknesses in System and Network Configurations Social Engineering Human Error and FoolishnessHackers, Thieves, and Spies Action Steps to Com bat Malicious Code Attacks

Chapter Two: Types of Malicious Code Email Viruses Trojans Back Doors Worms Blended Threats Time Bombs Spy Ware Ad Ware Steal Ware
Action Steps to Combat Malicious Code Attack s

Chapter Three: Review of Mali cious Code Incidents Historic Tidbits The Morr is Worm Melissa Love Bug Code Red

Read More
Format
Paperback
Publisher
Elsevier Science & Technology
Country
United Kingdom
Date
21 September 2004
Pages
232
ISBN
9780750678483