Computer Viruses and Malware
Seiten
2010
|
Softcover reprint of hardcover 1st ed. 2006
Springer-Verlag New York Inc.
978-1-4419-4016-2 (ISBN)
Springer-Verlag New York Inc.
978-1-4419-4016-2 (ISBN)
It also looks at the application of malicious software to computer crime and information warfare.
Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry.
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.
Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry.
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.
Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
We’ve Got Problems.- Definitions and Timeline.- Viruses.- Anti-Virus Techniques.- Anti-Anti-Virus Techniques.- Weaknesses Exploited.- Worms.- Deworming.- “Applications”.- People and Communities.- What Should we do?.
Reihe/Serie | Advances in Information Security ; 22 |
---|---|
Zusatzinfo | 30 Illustrations, black and white; XVI, 228 p. 30 illus. |
Verlagsort | New York, NY |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Office Programme ► Outlook | |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Wirtschaft ► Betriebswirtschaft / Management | |
ISBN-10 | 1-4419-4016-2 / 1441940162 |
ISBN-13 | 978-1-4419-4016-2 / 9781441940162 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
eine Cyberstaatsanwältin ermittelt
Buch | Hardcover (2024)
Murmann Publishers (Verlag)
CHF 34,95