Malware: Fighting Malicious Code
来源:互联网 发布:文泰刻绘端口安装 编辑:程序博客网 时间:2024/04/28 13:07
This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn.
This book includes:*Solutions and examples that cover both UNIX(R) and Windows(R)
*Practical, time-tested, real-world actions you can take to secure your systems
*Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly!
*Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home computer users, and anyone else interested in keeping their systems safe from attackers
http://rapidshare.com/files/40489338/0131014056.rar
http://depositfiles.com/files/1136696
- Malware: Fighting Malicious Code
- Malware Forensics: Investigating and Analyzing Malicious Code
- MACTANS: INJECTING MALWARE INTO IOS DEVICES VIA MALICIOUS CHARGERS
- Malicious Mobile Code: Virus Protection for Windows
- Identifying Malicious Code Through Reverse Engineering
- Fighting!!
- fighting
- fighting
- fighting
- FIGHTING~~
- fighting
- fighting....
- fighting~~~
- fighting
- fighting
- fighting
- fighting
- Fighting
- Six Sigma and the Product Development Cycle
- Scheduling in Real-Time Systems
- Intrusion Detection & Prevention
- Malicious Mobile Code: Virus Protection for Windows
- Hacking: The Art of Exploitation
- Malware: Fighting Malicious Code
- Windows Forensics and Incident Recovery
- Security Warrior
- Web Hacking: Attacks and Defense
- Professional ADO.NET 2: Programming with SQL Server 2005, Oracle, and MySQL
- Java™ Development on PDAs: Building Applications for PocketPC and Palm Devices
- Java In A Nutshell, 5th Edition
- Developer's Workshop to COM and ATL 3.0
- Bitter EJB