1 / 233
文档名称:

Elsevier - Trojans, Worms, And Spyware puter Security Professional's Guide To Malicious Code - 2005.pdf

格式:pdf   页数:233
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Elsevier - Trojans, Worms, And Spyware puter Security Professional's Guide To Malicious Code - 2005.pdf

上传人:bolee65 2014/7/18 文件大小:0 KB

下载得到文件列表

Elsevier - Trojans, Worms, And Spyware puter Security Professional's Guide To Malicious Code - 2005.pdf

文档介绍

文档介绍:TROJANS, WORMS, AND SPYWARE
This page intentionally left blank
TROJANS, WORMS, AND SPYWARE
puter Security Professional’s Guide
to Malicious Code
Michael Erbschloe
AMSTERDAM • BOSTON • HEIDELBERG • LONDON
NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Elsevier Butterworth–Heinemann
200 Wheeler Road, Burlington, MA 01803, USA
Linacre House, Jordan Hill, Oxford OX2 8DP, UK
Copyright © 2005, Elsevier Inc. All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means, electronic, mechanical, photocopying,
recording, or otherwise, without the prior written permission of the publisher.
Permissions may be sought directly from Elsevier’s Science & Technology Rights
Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333,
e-mail: ******@.uk. You may plete your request on-line
via the Elsevier homepage (), by selecting “Customer Support”
and then “Obtaining Permissions.”
Recognizing the importance of preserving what has been written, Elsevier prints its
books on acid-free paper whenever possible.
Library of Congress Cataloging-in-Publication Data
Application submitted.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
ISBN: 0-7506-7848-8
For information on all Butterworth–Heinemann publications
visit our website at http://books./security
03 04 05 06 07 08 09 10 9 8 7 6 5 4 3 2 1
Printed in the United States of America
To my mother
To my friends Blaster and Razer
Table of Contents
Preface xiii
Introduction xv
Inside This Book xvii
Acknowledgements xix
1 Malicious Code Overview 1
Why Malicious Code Attacks Are Dangerous 3
Impact of Malicious Code Attacks on
Corporate Security 6
Why Malicious Code Attacks Work 8
Action Steps bat Malicious Code Attacks 15
2 Types of Malicious Code 17
E-mail Viruses and Miscellan