Important Update: In Light of the Latest Government Guidelines on COVID, deliveries of Non-Essential products will be delayed.
 
About the Book

Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jumping-off point to spread to all of your buddies' computers; and steal files from your machine. Malicious code in the hands of a crafty attacker is indeed powerful. It's becoming even more of a problem because many of the very same factors fueling the evolution of the computer industry are making our systems even more vulnerable to malicious code. Specifically, malicious code writers benefit from the trends toward mixing static data and executable instructions, increasingly homogenous computing environments, unprecedented connectivity, an ever-larger clueless user base, and an unfriendly world. Skoudis addressed malicious code in just one chapter of his previous book. Here, a dozen chapters focus on one of the most interesting and rapidly developing areas of computer attacks.*Chapter 11, Defender's Toolbox, rolls together the defensive strategies described in the book. As a bonus, Skoudis gives recipes for creating your own malicious code analysis laboratory using cheap hardware and software.


About the Author:

ED SKOUDIS is a computer security consultant with International Network Services. Ed's expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed secure network architectures, and responded to computer attacks. A frequent speaker on issues associated with hacker tools and effective defenses, Ed has published several articles, as well as the highly acclaimed Counter Attack: A Step-by-Step Guide to Computer Attacks and Effective Defenses (Prentice Hall PTR, 2001).

Book Details
ISBN-13: 9780131014053
Publisher: Prentice Hall
Publisher Imprint: PRENTICE HALL
Depth: 44
Language: English
Returnable: Y
Spine Width: 38 mm
Weight: 1090 gr
ISBN-10: 0131014056
Publisher Date: 07 Nov 2003
Binding: Paperback
Height: 234 mm
No of Pages: 672
Series Title: Prentice Hall Series in Computer Networking and Distributed
Sub Title: Fighting Malicious Code
Width: 175 mm
User Reviews

Be the first to Write a Review on this book Malware