Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malware: Fighting Malicious Code

Buy
Malware: Fighting Malicious Code, 9780131014053 (0131014056), Prentice Hall, 2003
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it!

This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes:

  • Solutions and examples that cover both UNIX® and Windows®
  • Practical, time-tested, real-world actions you can take to secure your systems
  • Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly!

Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home computer users, and anyone else interested in keeping their systems safe from attackers.

About the Author

ED SKOUDIS is a computer security consultant with International Network Services. Ed's expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed secure network architectures, and responded to computer attacks. A frequent speaker on issues associated with hacker tools and effective defenses, Ed has published several articles, as well as the highly acclaimed Counter Attack: A Step-by-Step Guide to Computer Attacks and Effective Defenses (Prentice Hall PTR, 2001).

(HTML tags aren't allowed.)

Public Speaking Success in 20 Minutes a Day
Public Speaking Success in 20 Minutes a Day

Public speaking is considered one of the highest causes of fear and stress for most people, yet it is practically unavoidable over the course of a lifetime. Weddings, religious occasions, funerals, banquets, sales presentations-these are just a few of the situations which require people to share words with a large group. This guide, a new...

Schaum's Outline of Advanced Calculus, Third Edition (Schaum's Outline Series)
Schaum's Outline of Advanced Calculus, Third Edition (Schaum's Outline Series)

Tough Test Questions? Missed Lectures? Not Enough Time?

Fortunately for you, there's Schaum's.

More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Outline presents all...

JUNOS Enterprise Routing: A Practical Guide to JUNOS Software and Enterprise Certification
JUNOS Enterprise Routing: A Practical Guide to JUNOS Software and Enterprise Certification
The world of enterprise routing with Juniper Networks devices is getting very exciting—new technologies, products, and network developments are making the enterprise network environment one of the most dynamic places to be. However, we, the authors, hope to focus that energy by providing you with a detailed and practical foundation that...

Soft Computing for Data Mining Applications (Studies in Computational Intelligence)
Soft Computing for Data Mining Applications (Studies in Computational Intelligence)
The authors have consolidated their research work in this volume titled Soft Computing for Data Mining Applications. The monograph gives an insight into the research in the ?elds of Data Mining in combination with Soft Computing methodologies. In these days, the data continues to grow - ponentially. Much of the data is implicitly or explicitly...
Essential XML Quick Reference: A Programmer's Reference to XML,  XPath, XSLT, XML Schema, SOAP, and More
Essential XML Quick Reference: A Programmer's Reference to XML, XPath, XSLT, XML Schema, SOAP, and More

"Finally, a complete and thorough reference book covering all of the most important XML technologies, including the latest addition (XML Schema), in one concise and consistent presentation. I will definitely have this book close at hand."
—Chris Lovett, Product Unit Manager, B2B Web Services, Microsoft

...
The Bloomsbury Companion to Socrates (Bloomsbury Companions)
The Bloomsbury Companion to Socrates (Bloomsbury Companions)

Socrates, the largely enigmatic Greek thinker, is universally considered to have laid the foundations of western philosophy. His philosophy, available to us through the early dialogues of Plato and the writings of his contemporaries, has had a remarkably enduring influence on virtually every area of philosophical enterprise .

This...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy