| One of the biggest headaches that comes along with networked and Internetconnected computers is the absolute requirement of dealing with malicious code attacks. There is no choice; if your systems are not equipped in some way with antivirus protection, sooner or later some bug will eat them. There is also very little to be gained by whining about how vulnerable computer systems are to malicious code attacks.
The purpose of this book is to show organizations how to effectively and efficiently organize and maintain their defenses against malicious code attacks. Chapter 1 provides an overview of malicious code and explains the basic principles of how malicious code works and why attacks can be so dangerous for an organization. This includes an analysis of why malicious code works so well. Present and expected weaknesses in commercial off-the-shelf software are covered, as well as the many things computer users do wrong when confronted with unknown or unexpected situations. |
|
|
Private Debt: Opportunities in Corporate Direct Lending (Wiley Finance)
The essential resource for navigating the growing direct loan market
Private Debt: Opportunities in Corporate Direct Lending provides investors with a single, comprehensive resource for understanding this asset class amidst an environment of tremendous growth. Traditionally a niche asset class pre-crisis,... | | Visual Data Mining: Techniques and Tools for Data Visualization and Mining
Business intelligence solutions transform business data into conclusive, fact-based, and actionable information and enable businesses to spot customer trends, create customer loyalty, enhance supplier relationships, reduce financial risk, and uncover new sales opportunities. The goal of business intelligence is to make sense of change-to... | | Governance, Risk, and Compliance Handbook for Oracle Applications
-
Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
-
Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
... |
|