This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn.
This book includes:*Solutions and examples that cover both UNIX(R) and Windows(R)
*Practical, time-tested, real-world actions you can take to secure your systems
*Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly!
*Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home computer users, and anyone else interested in keeping their systems safe from attackers
http://rapidshare.com/files/40489338/0131014056.rar
http://depositfiles.com/files/1136696
恶意软件防范指南
本书全面介绍了各类恶意软件,包括病毒、蠕虫、浏览器和电子邮件客户端传递的恶意代码、后门、特洛伊木马等,并提供了针对每种类型攻击的防御措施。书中还介绍了如何建立自己的低成本恶意代码分析实验室。
1万+

被折叠的 条评论
为什么被折叠?



