Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
Preface Dedication Acknowledgements Introduction
Chapter One: Ma licious Code Overview Why Malicious Code Attacks are Danger ous The Impact of Malicious Code Attacks on Corporate Secur ity Why Malicious Code Attacks Work Flaws in S oftware
Weaknesses in System and Network Configurations Social Engineering Human Error and FoolishnessHackers, Thieves, and Spies Action Steps to Com bat Malicious Code Attacks
Chapter Two: Types of Malicious Code Email Viruses Trojans Back Doors Worms Blended Threats Time Bombs Spy Ware Ad Ware Steal Ware
Action Steps to Combat Malicious Code Attack s
Chapter Three: Review of Mali cious Code Incidents Historic Tidbits The Morr is Worm Melissa Love Bug Code Red
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Preface Dedication Acknowledgements Introduction
Chapter One: Ma licious Code Overview Why Malicious Code Attacks are Danger ous The Impact of Malicious Code Attacks on Corporate Secur ity Why Malicious Code Attacks Work Flaws in S oftware
Weaknesses in System and Network Configurations Social Engineering Human Error and FoolishnessHackers, Thieves, and Spies Action Steps to Com bat Malicious Code Attacks
Chapter Two: Types of Malicious Code Email Viruses Trojans Back Doors Worms Blended Threats Time Bombs Spy Ware Ad Ware Steal Ware
Action Steps to Combat Malicious Code Attack s
Chapter Three: Review of Mali cious Code Incidents Historic Tidbits The Morr is Worm Melissa Love Bug Code Red