Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Trojans, Worms, and Spyware, First Edition : A Computer Security Professional's Guide to Malicious Code

Buy
One of the biggest headaches that comes along with networked and Internetconnected
computers is the absolute requirement of dealing with malicious
code attacks. There is no choice; if your systems are not equipped in some way
with antivirus protection, sooner or later some bug will eat them. There is also
very little to be gained by whining about how vulnerable computer systems are
to malicious code attacks.

The purpose of this book is to show organizations how to effectively and efficiently
organize and maintain their defenses against malicious code attacks.
Chapter 1 provides an overview of malicious code and explains the basic principles
of how malicious code works and why attacks can be so dangerous for an
organization. This includes an analysis of why malicious code works so well.
Present and expected weaknesses in commercial off-the-shelf software are covered,
as well as the many things computer users do wrong when confronted
with unknown or unexpected situations.
(HTML tags aren't allowed.)

ATL Internals: Working with ATL 8 (2nd Edition) (The Addison-Wesley Object Technology Series)
ATL Internals: Working with ATL 8 (2nd Edition) (The Addison-Wesley Object Technology Series)

The Classic Guide to ATL–Now Updated for ATL 8 and Visual Studio 2005

 

Four leading Windows programming experts systematically reveal ATL’s inner workings, explaining not just how ATL works, but why it works the way...

Recursive Methods in Economic Dynamics
Recursive Methods in Economic Dynamics
A magnificent work that is bound to have immense influence on the ways economists think about dynamic systems for many years to come. My own guess is that this book will eventually acquire the stature, say, of Hicks's Value and Capital or Samuelson's Foundations.
--Thomas J. Sargent, Hoover Institution

The
...
BackTrack 5 Cookbook
BackTrack 5 Cookbook

Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5

  • Learn to perform penetration tests with BackTrack 5
  • Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
  • Provides detailed...

OpenStack in Action
OpenStack in Action

Summary

OpenStack in Action offers the real world use cases and step-by-step instructions you can take to develop your own cloud platform from from inception to deployment. This book guides you through the design of both the physical hardware cluster and the infrastructure services you'll need to create a...

Race, Class, and the Death Penalty: Capital Punishment in American History
Race, Class, and the Death Penalty: Capital Punishment in American History

No scholarly effort is ever conducted without heavy indebtedness to others. This is particularly true of efforts that rest as heavily as this one does upon data collection efforts carried out by others. Our largest debt is, of course, to M. Watt Espy. Without his continuing effort, this study would have been impossible. We are profoundly...

Foundations of Soft Case-Based Reasoning (Wiley Series on Intelligent Systems)
Foundations of Soft Case-Based Reasoning (Wiley Series on Intelligent Systems)
A breakthrough on today’s fastest growing artificial intelligence technique

Many of today’s engineering and business computer applications require decisions to be made on the basis of uncertain or incomplete information, a phenomenon that has resulted in the development of case-based reasoning, a powerful computing technique by...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy