gogogo
Syndetics cover image
Image from Syndetics

Trojans, worms, and spyware : a computer security professional\'s guide to malicious code / Michael Erbschloe.

By: Material type: TextTextPublication details: Amsterdam ; Boston : Elsevier Butterworth Heinemann, c2005.Description: xix, 212 p. : ill. ; 23 cmISBN:
  • 0750678488
Subject(s): DDC classification:
  • 005.8 ERB
Online resources:
Contents:
Malicious code overview -- Types of malicious code -- Review of malicious code incidents -- Basic steps to combat malicious code attacks -- Organizing for security, prevention, and response -- Controlling computer behavior of employees -- Responding to a malicious code incident -- Model training program for end users -- The future of malicious code.

Enhanced descriptions from Syndetics:

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements. This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.

Includes bibliographical references and index.

Malicious code overview -- Types of malicious code -- Review of malicious code incidents -- Basic steps to combat malicious code attacks -- Organizing for security, prevention, and response -- Controlling computer behavior of employees -- Responding to a malicious code incident -- Model training program for end users -- The future of malicious code.

Author notes provided by Syndetics

Michael Erbschloe an information technology consultant, educator, and author. Michael has also taught and developed technology related curriculum for several universities including the University of Denver, and speaks at conferences and industry events around the world. He has authored hundreds of articles on technology and several books including Information Warfare: How to Survive Cyber Attacks.

Powered by Koha