Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jumpingoff point to spread to all of your buddies' computers; and steal files from your machine. Malicious code in the hands of a crafty attacker is indeed powerful. It's becoming even more of a problem because many of the very same factors fueling the evolution of the computer industry are making our systems even more vulnerable to malicious code. Specifically, malicious code writers benefit from the trends toward mixing static data and executable instructions, increasingly homogenous computing environments, unprecedented connectivity, an ever-larger clueless user base, and an unfriendly world. Skoudis addressed malicious code in just one chapter of his previous book. Here, a dozen chapters focus on one of the most interesting and rapidly developing areas of computer attacks. *Chapter 11, "Defender's Toolbox," rolls together the defensive strategies described in the book. As a bonus, Skoudis gives recipes for creating your own malicious code analysis laboratory using cheap hardware and software. *Foreword by Gene Schultz, security inspector for Global Integrity.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
ED SKOUDIS is a computer security consultant with International Network Services. Ed's expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed secure network architectures, and responded to computer attacks. A frequent speaker on issues associated with hacker tools and effective defenses, Ed has published several articles, as well as the highly acclaimed Counter Attack: A Step-by-Step Guide to Computer Attacks and Effective Defenses (Prentice Hall PTR, 2001).
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 3,45 expédition depuis Royaume-Uni vers France
Destinations, frais et délaisEUR 25,74 expédition depuis Etats-Unis vers France
Destinations, frais et délaisVendeur : AwesomeBooks, Wallingford, Royaume-Uni
Paperback. Etat : Very Good. Malware: Fighting Malicious Code (Prentice Hall Series in Computer Networking and Distributed) This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. N° de réf. du vendeur 7719-9780131014053
Quantité disponible : 1 disponible(s)
Vendeur : Bahamut Media, Reading, Royaume-Uni
Paperback. Etat : Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee. N° de réf. du vendeur 6545-9780131014053
Quantité disponible : 1 disponible(s)
Vendeur : Better World Books Ltd, Dunfermline, Royaume-Uni
Etat : Good. 1st. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. N° de réf. du vendeur GRP70792505
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Dallas, Dallas, TX, Etats-Unis
Paperback. Etat : Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.9. N° de réf. du vendeur G0131014056I3N00
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Phoenix, Phoenix, AZ, Etats-Unis
Paperback. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.9. N° de réf. du vendeur G0131014056I4N00
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Atlanta, AUSTELL, GA, Etats-Unis
Paperback. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.9. N° de réf. du vendeur G0131014056I4N00
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Atlanta, AUSTELL, GA, Etats-Unis
Paperback. Etat : Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.9. N° de réf. du vendeur G0131014056I3N00
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Dallas, Dallas, TX, Etats-Unis
Paperback. Etat : Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 2.9. N° de réf. du vendeur G0131014056I5N00
Quantité disponible : 1 disponible(s)
Vendeur : SecondSale, Montgomery, IL, Etats-Unis
Etat : Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. N° de réf. du vendeur 00089190709
Quantité disponible : 2 disponible(s)
Vendeur : SecondSale, Montgomery, IL, Etats-Unis
Etat : Acceptable. Item in acceptable condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. N° de réf. du vendeur 00090553954
Quantité disponible : 1 disponible(s)