Normal view MARC view ISBD view

Computer viruses and malware / by John Aycock.

By: Aycock, John Daniel, 1970-.
Material type: TextTextSeries: Springer.Advances in information security: v. 22.Publisher: New York ; London : Springer, 2006Description: 1 online resource (xvi, 227 p.) : ill.ISBN: 9780387341880; 0387341889; 0387302360 (cased); 9780387302362 (cased); 9786610716203; 661071620X.Subject(s): Computer viruses | Computer networks -- Security measures | Malware (Computer software)Additional physical formats: Print version:: Computer viruses and malware.DDC classification: 005.84 LOC classification: QA76.76.C68 | A96 2006Online resources: Click here to view this ebook.
Contents:
We've Got Problems; Definitions and Timeline; Viruses; Anti-Virus Techniques; Anti-Anti-Virus Techniques; Weaknesses Exploited; Worms; Deworming; "Applications"; People and Communities; What Should we do?
Summary: Provides a view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Copy number Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.76.C68 A96 2006 (Browse shelf) http://ezproxy.uttyler.edu:2048/login?url=http://dx.doi.org/10.1007/0-387-34188-9 1 Available ocn209917904
Electronic Book UT Tyler Online
Withdrawn
QA76.76.C68 A96 2006 (Browse shelf) 2 Withdrawn ocn209917904-2

Includes bibliographical references and index.

We've Got Problems; Definitions and Timeline; Viruses; Anti-Virus Techniques; Anti-Anti-Virus Techniques; Weaknesses Exploited; Worms; Deworming; "Applications"; People and Communities; What Should we do?

Provides a view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.

There are no comments for this item.

Log in to your account to post a comment.