Reveals how attackers install malicious code and how they evade detectionShows how you can defeat their schemes and keep your computers and network safe!Details viruses, worms, backdoors, Trojan horses, RootKits, and other threatsExplains how to handle today's threats, with an eye on handling the threats to comeThis is a truly outstanding book-enormous technical wealth and beautifully written. Warwick FordEd does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security! Harlan Carvey, CISSPThis book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle. Radia Perlman, Distinguished Engineer, Sun MicrosystemsKeep control of your systems out of the hands of unknown attackersIgnoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for compute
About the Author:
ED SKOUDIS is a computer security consultant with International Network Services. Ed's expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed secure network architectures, and responded to computer attacks. A frequent speaker on issues associated with hacker tools and effective defenses, Ed has published several articles, as well as the highly acclaimed Counter Attack: A Step-by-Step Guide to Computer Attacks and Effective Defenses (Prentice Hall PTR, 2001).