|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: David SalomonPublisher: Springer London Ltd Imprint: Springer London Ltd Edition: 2010 ed. Dimensions: Width: 15.50cm , Height: 2.00cm , Length: 23.50cm Weight: 1.220kg ISBN: 9780857290052ISBN 10: 0857290053 Pages: 375 Publication Date: 16 August 2010 Audience: College/higher education , General/trade , Undergraduate , General Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsPhysical Security Viruses Worms Trojan Horses Examples of Malware Prevention and Defense Network Security Authentication Spyware Identity Theft Privacy and TrustReviews<p>From the reviews: Salomon presents a detailed overview of the history of malicious code and the creators that spawned it. This is an excellent reference for those new to security practices, from home users to students, it provides guidance on how to secure a computer system and understand the risks to the system. This excellent, readable, and enjoyable work should be on the shelves of all personal computer users. Summing Up: Highly recommended. Lower-division undergraduates and general readers. (T. D. Richardson, Choice, Vol. 48 (7), March, 2011) From the reviews: Salomon ... presents a detailed overview of the history of malicious code and the creators that spawned it. This is an excellent reference for those new to security practices, from home users to students, it provides guidance on how to secure a computer system and understand the risks to the system. ... This excellent, readable, and enjoyable work should be on the shelves of all personal computer users. Summing Up: Highly recommended. Lower-division undergraduates and general readers. (T. D. Richardson, Choice, Vol. 48 (7), March, 2011) Author InformationTab Content 6Author Website:Countries AvailableAll regions |