-
Author Tom Liston , Ed Skoudis
“I finally get it! I used to hear words like rootkit, buffer overflow, and idle scanning, and they just didn’t make any sense. I asked other people and they didn’t seem to know how these things work, or at least they couldn’t explain them in a way that I could unde....
Release Date 2005/12 -
Malware: Fighting Malicious Code
Author Lenny Zeltser , Ed Skoudis
Reveals how attackers install malicious code and how they evade detectionShows how you can defeat their schemes and keep your computers and network safe!Details viruses, worms, backdoors, Trojan horses, RootKits, and other threatsExplains how to handle today's thre....
Release Date 2003/11