pregleda

Securing the Network from Malicious Code -D. Schweitzer


Cena:
995 din
Stanje: Nekorišćen
Garancija: Ne
Isporuka: Pošta
Lično preuzimanje
Plaćanje: Tekući račun (pre slanja)
Lično
Grad: Beograd-Mladenovac,
Beograd-Mladenovac
Prodavac

kukuruz (9016)

PREMIUM član
Član je postao Premium jer:
- ima 100 jedinstvenih pozitivnih ocena od kupaca,
- tokom perioda od 6 meseci uplati minimum 20.000 dinara na svoj Limundo račun.

100% pozitivnih ocena

Pozitivne: 38002

  Pošalji poruku

Svi predmeti člana


Kupindo zaštita

ISBN: 9780764549588
Godina izdanja: 2002
Oblast: Aplikacije i softver
Jezik: Engleski
Autor: Strani

A Complete Guide to Defending Against Viruses, Worms, and Trojans

Wiley 2002 360 strana

odlična očuvanost

Acknowledgments. Introduction. Part I: Threat Analysis. Chapter 1: Threats Posed by Viruses, Worms, and Trojan Horses. Chapter 2: Virus Writers and Hackers: Architects of Digital Disease. Chapter 3: Other Digital Threats to Your Organization. Chapter 4: Types of Viruses, Trojan Horses, and Malicious Code. Part II: Applied Tactics for Malicious Code Defense. Chapter 5: Fundamentals Needed for Digital Security. Chapter 6: Networking and Internet Essentials. Chapter 7: Internet Relay Chat (IRC), I-Seek-You (ICQ), Web Page Chat, and Instant Messaging. Chapter 8: Defending Your Company`s Network Using Human Resources. Chapter 9: Hardware and Software Protective Measures. Chapter 10: Server-Side Exploits. Part III: Looking Ahead. Chapter 11: Cyberterrorism and Hacktivism-New Millennium, New Threats. Chapter 12: Cyberforensics and the Future of Virus Warfare. Appendix A: What`s on the Web Site. Appendix B: Cybercrime before Congress. Appendix C: It`s Not Just Fun and `War Games`-Juveniles and Computer Crime. Appendix D: National Infrastructure Protection Center Statement on Cybersecurity Appendix E: National Infrastructure Protection Center Statement on Cybercrime. Appendix F: Glossary-Worm Words and Virus Vocabulary. Index.

Cover procedures and practices for everything from social engineering to effectively configuring an intrusion detection system.
* Author provides the benefit of his day-to-day practices as a security expert.
* Companion Website features several non-shareware products for effectively defending against malicious code.

Cene su konačne!

Ne šaljem u inostranstvo!

Ne šaljem na Kosovo (tj. Pošta ne prima pošiljke za Kosovo).

Predmet: 81839213
A Complete Guide to Defending Against Viruses, Worms, and Trojans

Wiley 2002 360 strana

odlična očuvanost

Acknowledgments. Introduction. Part I: Threat Analysis. Chapter 1: Threats Posed by Viruses, Worms, and Trojan Horses. Chapter 2: Virus Writers and Hackers: Architects of Digital Disease. Chapter 3: Other Digital Threats to Your Organization. Chapter 4: Types of Viruses, Trojan Horses, and Malicious Code. Part II: Applied Tactics for Malicious Code Defense. Chapter 5: Fundamentals Needed for Digital Security. Chapter 6: Networking and Internet Essentials. Chapter 7: Internet Relay Chat (IRC), I-Seek-You (ICQ), Web Page Chat, and Instant Messaging. Chapter 8: Defending Your Company`s Network Using Human Resources. Chapter 9: Hardware and Software Protective Measures. Chapter 10: Server-Side Exploits. Part III: Looking Ahead. Chapter 11: Cyberterrorism and Hacktivism-New Millennium, New Threats. Chapter 12: Cyberforensics and the Future of Virus Warfare. Appendix A: What`s on the Web Site. Appendix B: Cybercrime before Congress. Appendix C: It`s Not Just Fun and `War Games`-Juveniles and Computer Crime. Appendix D: National Infrastructure Protection Center Statement on Cybersecurity Appendix E: National Infrastructure Protection Center Statement on Cybercrime. Appendix F: Glossary-Worm Words and Virus Vocabulary. Index.

Cover procedures and practices for everything from social engineering to effectively configuring an intrusion detection system.
* Author provides the benefit of his day-to-day practices as a security expert.
* Companion Website features several non-shareware products for effectively defending against malicious code.
81839213 Securing the Network from Malicious Code -D. Schweitzer

LimundoGrad koristi kolačiće u statističke i marketinške svrhe. Nastavkom korišćenja sajta smatramo da ste pristali na upotrebu kolačića. Više informacija.