Reveals how attackers install malicious code and how they evade detection. This title shows how you can defeat their schemes and keep your computers and network safe. It details viruses, worms, backdoors, Trojan horses, RootKits, and other threats. It covers information about the characteristics and methods of attack.
Bio de l'auteur
Sommaire / contenu