Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code, Michael Erbschloe (Author, educator and security advisor, Washington, DC),Michael Erbschloe (Author, educator and security advisor, Washington, DC),Michael Erbschloe (Author, educator and security advisor, Washington, DC),Michael Erbschloe (Author, educator and security advisor, Washington, DC) (9780750678483) — Readings Books
Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code
Paperback

Trojans, Worms, and Spyware: A Computer Security Professional’s Guide to Malicious Code

$99.95
Sign in or become a Readings Member to add this title to your wishlist.

Preface Dedication Acknowledgements Introduction

Chapter One: Ma licious Code Overview Why Malicious Code Attacks are Danger ous The Impact of Malicious Code Attacks on Corporate Secur ity Why Malicious Code Attacks Work Flaws in S oftware
Weaknesses in System and Network Configurations Social Engineering Human Error and FoolishnessHackers, Thieves, and Spies Action Steps to Com bat Malicious Code Attacks

Chapter Two: Types of Malicious Code Email Viruses Trojans Back Doors Worms Blended Threats Time Bombs Spy Ware Ad Ware Steal Ware
Action Steps to Combat Malicious Code Attack s

Chapter Three: Review of Mali cious Code Incidents Historic Tidbits The Morr is Worm Melissa Love Bug Code Red

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO

Stock availability can be subject to change without notice. We recommend calling the shop or contacting our online team to check availability of low stock items. Please see our Shopping Online page for more details.

Format
Paperback
Publisher
Elsevier Science & Technology
Country
United Kingdom
Date
21 September 2004
Pages
232
ISBN
9780750678483

Preface Dedication Acknowledgements Introduction

Chapter One: Ma licious Code Overview Why Malicious Code Attacks are Danger ous The Impact of Malicious Code Attacks on Corporate Secur ity Why Malicious Code Attacks Work Flaws in S oftware
Weaknesses in System and Network Configurations Social Engineering Human Error and FoolishnessHackers, Thieves, and Spies Action Steps to Com bat Malicious Code Attacks

Chapter Two: Types of Malicious Code Email Viruses Trojans Back Doors Worms Blended Threats Time Bombs Spy Ware Ad Ware Steal Ware
Action Steps to Combat Malicious Code Attack s

Chapter Three: Review of Mali cious Code Incidents Historic Tidbits The Morr is Worm Melissa Love Bug Code Red

Read More
Format
Paperback
Publisher
Elsevier Science & Technology
Country
United Kingdom
Date
21 September 2004
Pages
232
ISBN
9780750678483