|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-34188-0 |
003 |
DE-He213 |
005 |
20220120214837.0 |
007 |
cr nn 008mamaa |
008 |
100301s2006 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387341880
|9 978-0-387-34188-0
|
024 |
7 |
|
|a 10.1007/0-387-34188-9
|2 doi
|
050 |
|
4 |
|a QA76.9.D35
|
050 |
|
4 |
|a Q350-390
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a GPF
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
072 |
|
7 |
|a UMB
|2 thema
|
072 |
|
7 |
|a GPF
|2 thema
|
082 |
0 |
4 |
|a 005.73
|2 23
|
082 |
0 |
4 |
|a 003.54
|2 23
|
100 |
1 |
|
|a Aycock, John.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Computer Viruses and Malware
|h [electronic resource] /
|c by John Aycock.
|
250 |
|
|
|a 1st ed. 2006.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2006.
|
300 |
|
|
|a XVI, 228 p. 30 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 2512-2193 ;
|v 22
|
505 |
0 |
|
|a We've Got Problems -- Definitions and Timeline -- Viruses -- Anti-Virus Techniques -- Anti-Anti-Virus Techniques -- Weaknesses Exploited -- Worms -- Deworming -- "Applications" -- People and Communities -- What Should we do?.
|
520 |
|
|
|a Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computer input-output equipment.
|
650 |
1 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a e-Commerce and e-Business.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Input/Output and Data Communications.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441940162
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387510736
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387302362
|
830 |
|
0 |
|a Advances in Information Security,
|x 2512-2193 ;
|v 22
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/0-387-34188-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|