Search Books
Java: An Introduction to Co… Optimizing Network Performa…

Malware: Fighting Malicious Code

Author Ed Skoudis, Lenny Zeltser
Publisher Prentice Hall
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
43.63 64.99 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $3.85

✓ Usually ships in 24 hours

Share:
Book Details
PublisherPrentice Hall
ISBN / ASIN0131014056
ISBN-139780131014053
AvailabilityUsually ships in 24 hours
Sales Rank866,165
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jumpingoff point to spread to all of your buddies' computers; and steal files from your machine. Malicious code in the hands of a crafty attacker is indeed powerful. It's becoming even more of a problem because many of the very same factors fueling the evolution of the computer industry are making our systems even more vulnerable to malicious code. Specifically, malicious code writers benefit from the trends toward mixing static data and executable instructions, increasingly homogenous computing environments, unprecedented connectivity, an ever-larger clueless user base, and an unfriendly world. Skoudis addressed malicious code in just one chapter of his previous book. Here, a dozen chapters focus on one of the most interesting and rapidly developing areas of computer attacks. *Chapter 11, "Defender's Toolbox," rolls together the defensive strategies described in the book. As a bonus, Skoudis gives recipes for creating your own malicious code analysis laboratory using cheap hardware and software. *Foreword by Gene Schultz, security inspector for Global Integrity.
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View