000 01156 a2200253 4500
003 Nust
005 20230821134656.0
010 _a 2003063261
020 _c0131014056 (alk. paper)
040 _cNust
082 0 0 _a005.8,SKO
100 1 _aSkoudis, Ed.
_974595
245 1 0 _aMalware :
_bfighting malicious code /
_cEd Skoudis with Lenny Zeltser.
260 _aUpper Saddle River, NJ :
_bPrentice Hall PTR,
_c2004.
300 _axxii, 647 p. :
_bill. ;
_c23 cm.
490 1 _aPrentice Hall series in computer networking and distributed systems
505 _aIntroduction (Page-1), Viruses (Page-25), Worms (Page-71), Malicious Mobile Code (Page-117), Backdoors (Page-187), Trojan Horses (Page-251), User-Mode Root kits (Page-306), Kernel-Mode Root Kits (Page-379), Going Deeper (Page-465), Scenarios (Page-519), Malware Analysis (Page-557), Conclusion (Page-625).
650 0 _aComputer crimes.
_918532
650 0 _aComputer networks
_xSecurity measures.
_9466
650 0 _aComputer security.
_9570
700 1 _aZeltser, Lenny.
_995365
830 0 _aPrentice Hall series in computer networking and distributed systems
_995366
942 _2ddc
_cBK
999 _c211196
_d211196