Trojans, Worms, and Spyware A Computer Security Professionals Guide~tqw~ darksidergseeders: 0
leechers: 0
Trojans, Worms, and Spyware A Computer Security Professionals Guide~tqw~ darksiderg (Size: 1.32 MB)
Description
*******************************************************************************
Trojans, Worms, and Spyware: A Computer Security Professional\'s Guide ******************************************************************************* General InformationType.................: Ebook Part Size............: 1,376,164 bytes Post InformationPosted by............: ~tqw~ Release Notesrojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global and domestic (US) economic downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements. Everyone in business today knows what a virus is and, loosely, what effects it can have on computers and networked systems. This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats — new and advanced variants of Trojans, as well as spyware (both hardware and software) and \"bombs\" — and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks. *A one-minute manager section and approach toissues *Step-by-step instructions on how to identify and accomplish security objectives *Easy to implement advice for defending against malicious code attacks *Resources to get in-depth information on each of the major security functions Table of Contents 1 Malicious code overview 1 2 Types of malicious code 17 3 Review of malicious code incidents 31 4 Basic steps to combat malicious code attacks 51 5 Organizing for security, prevention, and response 69 6 Controlling computer behavior of employees 89 7 Responding to a malicious code incident 109 8 Model training program for end users 133 9 The future of malicious code 157 App Computer security resources 185 Product Details * ISBN: 0750678488 * ISBN-13: 9780750678483 * Format: Paperback, 232pp * Publisher: Elsevier Science & Technology Books * Pub. Date: November 2004 Install NotesAdobe Acrobat Reader Related Torrents
Sharing Widget |