|
|
|
|
LEADER |
02878nam a22005655i 4500 |
001 |
978-0-387-34188-0 |
003 |
DE-He213 |
005 |
20151204173536.0 |
007 |
cr nn 008mamaa |
008 |
100301s2006 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387341880
|9 978-0-387-34188-0
|
024 |
7 |
|
|a 10.1007/0-387-34188-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D35
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
100 |
1 |
|
|a Aycock, John.
|e author.
|
245 |
1 |
0 |
|a Computer Viruses and Malware
|h [electronic resource] /
|c by John Aycock.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2006.
|
300 |
|
|
|a XVI, 228 p. 30 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 1568-2633 ;
|v 22
|
505 |
0 |
|
|a We’ve Got Problems -- Definitions and Timeline -- Viruses -- Anti-Virus Techniques -- Anti-Anti-Virus Techniques -- Weaknesses Exploited -- Worms -- Deworming -- “Applications” -- People and Communities -- What Should we do?.
|
520 |
|
|
|a Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Input-output equipment (Computers).
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a E-commerce.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a e-Commerce/e-business.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Input/Output and Data Communications.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387302362
|
830 |
|
0 |
|a Advances in Information Security,
|x 1568-2633 ;
|v 22
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/0-387-34188-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|