|
![]() |
|||
|
||||
OverviewHow hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software's effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are included. Full Product DetailsAuthor: Kris KasperskyPublisher: A-List Imprint: A-List Dimensions: Width: 18.50cm , Height: 2.40cm , Length: 23.00cm Weight: 0.866kg ISBN: 9781931769464ISBN 10: 193176946 Pages: 500 Publication Date: 01 November 2005 Audience: General/trade , General Format: Mixed media product Publisher's Status: Inactive Availability: Out of stock ![]() Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |