Ebook176 pages3 hours
Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code
Rating: 4 out of 5 stars
4/5
()
About this ebook
Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements. This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats – new and advanced variants of Trojans, as well as spyware (both hardware and software) and “bombs – and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack *Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks *Illustrates to managers and their staffs the importance of having protocols and a response plan in place
*Provides step-by-step instructions to follow in the event of an attack *Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks *Illustrates to managers and their staffs the importance of having protocols and a response plan in place
Author
Michael Erbschloe
Michael Erbschloe an information technology consultant, educator, and author. Michael has also taught and developed technology related curriculum for several universities including the University of Denver, and speaks at conferences and industry events around the world. He has authored hundreds of articles on technology and several books including Information Warfare: How to Survive Cyber Attacks.
Read more from Michael Erbschloe
Implementing Homeland Security for Enterprise IT Rating: 0 out of 5 stars0 ratingsPhysical Security for IT Rating: 5 out of 5 stars5/5Net Privacy: A Guide to Developing & Implementing an Ironclad ebusiness Privacy Plan Rating: 0 out of 5 stars0 ratingsSocially Responsible IT Management Rating: 0 out of 5 stars0 ratings
Related to Trojans, Worms, and Spyware
Related ebooks
Ethical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsHacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsHack Attacks Denied: A Complete Guide to Network Lockdown Rating: 4 out of 5 stars4/5Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations Rating: 0 out of 5 stars0 ratingsKali Linux CTF Blueprints Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsRansomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks Rating: 0 out of 5 stars0 ratingsThe Certified Ethical Hacker Exam - version 8 (The concise study guide) Rating: 3 out of 5 stars3/5Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues Rating: 0 out of 5 stars0 ratingsSimple Computer Security: Disinfect Your PC Rating: 0 out of 5 stars0 ratingsWireless Operational Security Rating: 0 out of 5 stars0 ratingsHacking : Guide to Computer Hacking and Penetration Testing Rating: 5 out of 5 stars5/5The Hacker's Guide to OS X: Exploiting OS X from the Root Up Rating: 0 out of 5 stars0 ratingsCEH: Certified Ethical Hacker v11 : Exam Cram Notes - First Edition - 2021 Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5CompTIA Security+ Certification Study Guide: Network Security Essentials Rating: 0 out of 5 stars0 ratingsHacking Rating: 3 out of 5 stars3/5CEH v9: Certified Ethical Hacker Version 9 Practice Tests Rating: 0 out of 5 stars0 ratingsNetwork Security A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsHardware Hacking: Have Fun while Voiding your Warranty Rating: 4 out of 5 stars4/5Ethical Hacking and Computer Securities For Beginners Rating: 4 out of 5 stars4/5Evaluation of Some Android Emulators and Installation of Android OS on Virtualbox and VMware Rating: 0 out of 5 stars0 ratingsHacking a Terror Network: The Silent Threat of Covert Channels Rating: 5 out of 5 stars5/5Anti-Virus Tools and Techniques for Computer Rating: 0 out of 5 stars0 ratingsComputer Networking: Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals Rating: 0 out of 5 stars0 ratingsHackproofing Your Wireless Network Rating: 0 out of 5 stars0 ratingsThe BillyGate Affair: How Hackers at Microsoft and Google Revealed Their Massive Malware Operation Rating: 0 out of 5 stars0 ratings
Enterprise Applications For You
Bitcoin For Dummies Rating: 4 out of 5 stars4/5Notion for Beginners: Notion for Work, Play, and Productivity Rating: 4 out of 5 stars4/5Zoom For Dummies Rating: 0 out of 5 stars0 ratingsMicrosoft Power Platform A Deep Dive: Dig into Power Apps, Power Automate, Power BI, and Power Virtual Agents (English Edition) Rating: 0 out of 5 stars0 ratingsExcel Data Analysis For Dummies Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Experts' Guide to OneNote Rating: 5 out of 5 stars5/5Learn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsEnterprise AI For Dummies Rating: 3 out of 5 stars3/5Excel Formulas and Functions 2020: Excel Academy, #1 Rating: 4 out of 5 stars4/5Excel 2019 For Dummies Rating: 3 out of 5 stars3/5QuickBooks 2023 All-in-One For Dummies Rating: 0 out of 5 stars0 ratings101 Ready-to-Use Excel Formulas Rating: 4 out of 5 stars4/5The New Email Revolution: Save Time, Make Money, and Write Emails People Actually Want to Read! Rating: 5 out of 5 stars5/5Excel Formulas That Automate Tasks You No Longer Have Time For Rating: 5 out of 5 stars5/5Excel : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Excel Programming: 1 Rating: 5 out of 5 stars5/5The Ridiculously Simple Guide To Numbers For Mac Rating: 0 out of 5 stars0 ratings102 Useful Excel 365 Functions: Excel 365 Essentials, #3 Rating: 0 out of 5 stars0 ratingsLow-Code/No-Code: Citizen Developers and the Surprising Future of Business Applications Rating: 3 out of 5 stars3/5Access 2019 For Dummies Rating: 0 out of 5 stars0 ratingsThe Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Rating: 4 out of 5 stars4/5Learn SQLite in 24 Hours Rating: 0 out of 5 stars0 ratingsExcel 2019 Bible Rating: 4 out of 5 stars4/5Mastering QuickBooks 2020: The ultimate guide to bookkeeping and QuickBooks Online Rating: 0 out of 5 stars0 ratingsQuickBooks 2021 For Dummies Rating: 0 out of 5 stars0 ratingsSystems Thinking: Managing Chaos and Complexity: A Platform for Designing Business Architecture Rating: 4 out of 5 stars4/5
Reviews for Trojans, Worms, and Spyware
Rating: 4 out of 5 stars
4/5
1 rating0 reviews
Book preview
Trojans, Worms, and Spyware - Michael Erbschloe
Enjoying the preview?
Page 1 of 1