Buch, Englisch, Band 22, 228 Seiten, Format (B × H): 154 mm x 242 mm, Gewicht: 1150 g
Buch, Englisch, Band 22, 228 Seiten, Format (B × H): 154 mm x 242 mm, Gewicht: 1150 g
Reihe: Advances in Information Security
ISBN: 978-0-387-30236-2
Verlag: Springer Us
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.
Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
Zielgruppe
Computer and information security practitioners
Autoren/Hrsg.
Fachgebiete
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management E-Commerce, E-Business, E-Marketing
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
Weitere Infos & Material
We’ve Got Problems.- Definitions and Timeline.- Viruses.- Anti-Virus Techniques.- Anti-Anti-Virus Techniques.- Weaknesses Exploited.- Worms.- Deworming.- “Applications”.- People and Communities.- What Should we do?.