Wiley.com
Print this page Share

Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans

ISBN: 978-0-7645-4958-8
Paperback
360 pages
October 2002
Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans  (0764549588) cover image
This title is out-of-print and not currently available for purchase from this site.

Acknowledgments.

Introduction.

Part I: Threat Analysis.

Chapter 1: Threats Posed by Viruses, Worms, and Trojan Horses.

Chapter 2: Virus Writers and Hackers: Architects of Digital Disease.

Chapter 3: Other Digital Threats to Your Organization.

Chapter 4: Types of Viruses, Trojan Horses, and Malicious Code.

Part II: Applied Tactics for Malicious Code Defense.

Chapter 5: Fundamentals Needed for Digital Security.

Chapter 6: Networking and Internet Essentials.

Chapter 7: Internet Relay Chat (IRC), I-Seek-You (ICQ), Web Page Chat, and Instant Messaging.

Chapter 8: Defending Your Company's Network Using Human Resources.

Chapter 9: Hardware and Software Protective Measures.

Chapter 10: Server-Side Exploits.

Part III: Looking Ahead.

Chapter 11: Cyberterrorism and Hacktivism-New Millennium, New Threats.

Chapter 12: Cyberforensics and the Future of Virus Warfare.

Appendix A: What's on the Web Site.

Appendix B: Cybercrime before Congress.

Appendix C: It's Not Just Fun and "War Games"-Juveniles and Computer Crime.

Appendix D: National Infrastructure Protection Center Statement on Cybersecurity

Appendix E: National Infrastructure Protection Center Statement on Cybercrime.

Appendix F: Glossary-Worm Words and Virus Vocabulary.

Index.

Related Titles

Security

by Peter H. Gregory
by David Litchfield, Chris Anley, John Heasman, Bill Grindlay
by Kevin Beaver, Peter T. Davis, Devin K. Akin (Foreword by)
by Ronald L. Krutz
Back to Top