Malware fighting malicious code

Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handlin...

Descripción completa

Detalles Bibliográficos
Autor principal: Skoudis, Ed (-)
Otros Autores: Zeltser, Lenny
Formato: Libro electrónico
Idioma:Inglés
Publicado: Upper Saddle River, NJ : Prentice Hall PTR 2004.
Edición:1st edition
Colección:Prentice Hall series in computer networking and distributed systems.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626938106719

Ejemplares similares