Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malware: Fighting Malicious Code

Buy
Malware: Fighting Malicious Code, 9780131014053 (0131014056), Prentice Hall, 2003
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it!

This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes:

  • Solutions and examples that cover both UNIX® and Windows®
  • Practical, time-tested, real-world actions you can take to secure your systems
  • Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly!

Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home computer users, and anyone else interested in keeping their systems safe from attackers.

About the Author

ED SKOUDIS is a computer security consultant with International Network Services. Ed's expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed secure network architectures, and responded to computer attacks. A frequent speaker on issues associated with hacker tools and effective defenses, Ed has published several articles, as well as the highly acclaimed Counter Attack: A Step-by-Step Guide to Computer Attacks and Effective Defenses (Prentice Hall PTR, 2001).

(HTML tags aren't allowed.)

Microsoft Excel 2013 Data Analysis and Business Modeling
Microsoft Excel 2013 Data Analysis and Business Modeling

Master business modeling and analysis techniques with Microsoft Excel 2013, and transform data into bottom-line results. Written by award-winning educator Wayne Winston, this hands-on, scenario-focused guide shows you how to use the latest Excel tools to integrate data from multiple tables—and how to effectively build a relational data...

UNIX Application Migration Guide (Patterns & Practices)
UNIX Application Migration Guide (Patterns & Practices)
This book contains guidelines and best practices for porting existing UNIX applications to Microsoft Windows, and covers planning and implementation issues and reviews the different ways in which such a migration can be done.

This guide is designed to give you the best information available about the issues that you are likely to face if
...
Physics for Game Programmers
Physics for Game Programmers
This book illustrates how to infuse compelling and realistic action into game programmingeven if you dont have a college-level physics background! This book covers the basic physics and mathematical models and then shows clearly how to implement them basics to accurately simulate the motion and behavior of cars, planes, projectiles, rockets, and...

MOS 2010 Study Guide for Microsoft® Excel® Expert
MOS 2010 Study Guide for Microsoft® Excel® Expert
Desktop computing proficiency is increasingly important in today’s business world. As a result, when screening, hiring, and training employees, employers can feel reassured by relying on the objectivity and consistency of technology certification to ensure the competence of their workforce. As an employee or job seeker, you...
Foundation Expression Blend 3 with Silverlight
Foundation Expression Blend 3 with Silverlight
The only real tool for developing cross-platform Rich Internet Applications (RIAs) for that last 11 years has been Flash; until now! Silverlight 3 allows you to develop cross-platform Rich Internet Applications in a fraction of the time because of the extensive and very powerful .NET 3.5 libraries, the powerful, design friendly Blend 3 Integrated...
Concurrency, Graphs and Models: Essays Dedicated to Ugo Montanari on the Occasion of His 65th Birthday
Concurrency, Graphs and Models: Essays Dedicated to Ugo Montanari on the Occasion of His 65th Birthday
This Festschrift volume, pubished in honor of Ugo Montanari on the occasion of his 65th birthday, contains 43 papers, written by friends and colleagues, all leading scientists in their own right, who congregated at a celebratory symposium held on June 12, 2008, in Pisa.

 

The volume consists of seven sections, six of...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy