0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New) Loot Price: R1,238
Discovery Miles 12 380
You Save: R83 (6%)
Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael...

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)

Michael Erbschloe

 (sign in to rate)
List price R1,321 Loot Price R1,238 Discovery Miles 12 380 | Repayment Terms: R116 pm x 12* You Save R83 (6%)

Bookmark and Share

Expected to ship within 12 - 17 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

General

Imprint: Butterworth-Heinemann
Country of origin: United Kingdom
Release date: September 2004
First published: November 2004
Authors: Michael Erbschloe
Dimensions: 229 x 152 x 12mm (L x W x T)
Format: Paperback
Pages: 232
Edition: New
ISBN-13: 978-0-7506-7848-3
Categories: Books > Computing & IT > Computer communications & networking > Network security
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Books > Academic & Education > Professional & Technical > Security
LSN: 0-7506-7848-8
Barcode: 9780750678483

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners