|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Douglas SchweitzerPublisher: John Wiley & Sons Inc Imprint: Hungry Minds Inc,U.S. Dimensions: Width: 18.90cm , Height: 2.10cm , Length: 23.40cm Weight: 0.544kg ISBN: 9780764549588ISBN 10: 0764549588 Pages: 360 Publication Date: 03 October 2002 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Out of Stock Indefinitely Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsAcknowledgments. Introduction. Part I: Threat Analysis. Chapter 1: Threats Posed by Viruses, Worms, and Trojan Horses. Chapter 2: Virus Writers and Hackers: Architects of Digital Disease. Chapter 3: Other Digital Threats to Your Organization. Chapter 4: Types of Viruses, Trojan Horses, and Malicious Code. Part II: Applied Tactics for Malicious Code Defense. Chapter 5: Fundamentals Needed for Digital Security. Chapter 6: Networking and Internet Essentials. Chapter 7: Internet Relay Chat (IRC), I--Seek--You (ICQ), Web Page Chat, and Instant Messaging. Chapter 8: Defending Your Company's Network Using Human Resources. Chapter 9: Hardware and Software Protective Measures. Chapter 10: Server--Side Exploits. Part III: Looking Ahead. Chapter 11: Cyberterrorism and Hacktivism--New Millennium, New Threats. Chapter 12: Cyberforensics and the Future of Virus Warfare. Appendix A: What's on the Web Site. Appendix B: Cybercrime before Congress. Appendix C: It's Not Just Fun and War Games --Juveniles and Computer Crime. Appendix D: National Infrastructure Protection Center Statement on Cybersecurity Appendix E: National Infrastructure Protection Center Statement on Cybercrime. Appendix F: Glossary--Worm Words and Virus Vocabulary. Index.ReviewsAuthor InformationDouglas Schweitzer, A+, Network+, i--Net+, CCNA, CIW, Brainbench Internet Security CertiTed, is vice--president at an actuarial consulting Trm, where he is responsible for network security and design. He is also the author of Internet Security Made Easy. Tab Content 6Author Website:Countries AvailableAll regions |