Trojans, Worms, and Spyware
eBook - PDF

Trojans, Worms, and Spyware

A Computer Security Professional's Guide to Malicious Code

  1. 232 pages
  2. English
  3. PDF
  4. Available on iOS & Android
eBook - PDF

Trojans, Worms, and Spyware

A Computer Security Professional's Guide to Malicious Code

About this book

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements. This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats – new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs – and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.*Provides step-by-step instructions to follow in the event of an attack *Case studies illustrate the "do's, " "don'ts, " and lessons learned from infamous attacks *Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Trojans, Worms, and Spyware by Michael Erbschloe in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Front Cover
  2. Trojans, Worms, and Spyware
  3. Copyright Page
  4. Table of Contents
  5. Preface
  6. Introduction
  7. Acknowledgements
  8. Chapter 1. Malicious Code Overview
  9. Chapter 2. Types of Malicious Code
  10. Chapter 3. Review of Malicious Code Incidents
  11. Chapter 4. Basic Steps to Combat Malicious Code Attacks
  12. Chapter 5. Organizing for Security, Prevention, and Response
  13. Chapter 6. Controlling Computer Behavior of Employees
  14. Chapter 7. Responding to a Malicious Code Incident
  15. Chapter 8. Model Training Program for End Users
  16. Chapter 9. The Future of Malicious Code
  17. Appendix–Computer Security Resources
  18. Index