"synopsis" may belong to another edition of this title.
"This is a truly outstanding book-enormous technical wealth and beautifully written."
—Warwick Ford
"Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!"
—Harlan Carvey, CISSP
"This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle."
—Radia Perlman, Distinguished Engineer, Sun Microsystems
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it!
This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes:
Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home computer users, and anyone else interested in keeping their systems safe from attackers.
ED SKOUDIS is a computer security consultant with International Network Services. Ed's expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed secure network architectures, and responded to computer attacks. A frequent speaker on issues associated with hacker tools and effective defenses, Ed has published several articles, as well as the highly acclaimed Counter Attack: A Step-by-Step Guide to Computer Attacks and Effective Defenses (Prentice Hall PTR, 2001).
"About this title" may belong to another edition of this title.
Shipping:
US$ 3.00
Within U.S.A.
Book Description Condition: new. Seller Inventory # newMercantile_0131014056
Book Description Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_0131014056
Book Description Condition: New. Fast Shipping - Safe and secure Mailer. Seller Inventory # 521PY6001T7X
Book Description Paperback. Condition: new. Buy for Great customer experience. Seller Inventory # GoldenDragon0131014056
Book Description Paperback. Condition: new. New. Seller Inventory # Wizard0131014056
Book Description Condition: new. Seller Inventory # FrontCover0131014056
Book Description Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think0131014056
Book Description Paperback. Condition: new. Prompt service guaranteed. Seller Inventory # Clean0131014056
Book Description Condition: New. New. In shrink wrap. Looks like an interesting title! 2.89. Seller Inventory # Q-0131014056
Book Description Condition: New. Buy with confidence! Book is in new, never-used condition. Seller Inventory # bk0131014056xvz189zvxnew