Trojans, worms, and spyware : a computer security professional's guide to malicious code /
Erbschloe, Michael, 1951-
Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Erbschloe. - Amsterdam ; Boston : Elsevier Butterworth Heinemann, ©2005. - 1 online resource (xix, 212 pages) : illustrations
Includes bibliographical references and index.
Malicious code overview -- Types of malicious code -- Review of malicious code incidents -- Basic steps to combat malicious code attacks -- Organizing for security, prevention, and response -- Controlling computer behavior of employees -- Responding to a malicious code incident -- Model training program for end users -- The future of malicious code.
Use copy
Electronic reproduction.
[S.l.] :
HathiTrust Digital Library,
2010.
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
http://purl.oclc.org/DLF/benchrepro0212
1417544473 9781417544479 1592783945 9781592783946 0080519687 9780080519685
EBL226748 eBook Library http://www.eblib.com DE069760-D2EA-4DF4-B36F-7C55974E4A1B OverDrive, Inc. http://www.overdrive.com
Computer security.
Computer viruses.
Spyware (Computer software)
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Computer security.
Computer security.
Electronic books.
Electronic books.
QA76.9.A25 / E737 2005eb
005.8
Trojans, worms, and spyware : a computer security professional's guide to malicious code / Michael Erbschloe. - Amsterdam ; Boston : Elsevier Butterworth Heinemann, ©2005. - 1 online resource (xix, 212 pages) : illustrations
Includes bibliographical references and index.
Malicious code overview -- Types of malicious code -- Review of malicious code incidents -- Basic steps to combat malicious code attacks -- Organizing for security, prevention, and response -- Controlling computer behavior of employees -- Responding to a malicious code incident -- Model training program for end users -- The future of malicious code.
Use copy
Electronic reproduction.
[S.l.] :
HathiTrust Digital Library,
2010.
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
http://purl.oclc.org/DLF/benchrepro0212
1417544473 9781417544479 1592783945 9781592783946 0080519687 9780080519685
EBL226748 eBook Library http://www.eblib.com DE069760-D2EA-4DF4-B36F-7C55974E4A1B OverDrive, Inc. http://www.overdrive.com
Computer security.
Computer viruses.
Spyware (Computer software)
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Computer security.
Computer security.
Electronic books.
Electronic books.
QA76.9.A25 / E737 2005eb
005.8