Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jumping-off point to spread to all of your buddies' computers; and steal files from your machine. Malicious code in the hands of a crafty attacker is indeed powerful. It's becoming even more of a problem because many of the very same factors fueling the evolution of the computer industry are making our systems even more vulnerable to malicious code. Specifically, malicious code writers benefit from the trends toward mixing static data and executable instructions, increasingly homogenous computing environments, unprecedented connectivity, an ever-larger clueless user base, and an unfriendly world. Skoudis addressed malicious code in just one chapter of his previous book. Here, a dozen chapters focus on one of the most interesting and rapidly developing areas of computer attacks.*Chapter 11, "Defender's Toolbox," rolls together the defensive strategies described in the book. As a bonus, Skoudis gives recipes for creating your own malicious code analysis laboratory using cheap hardware and software.
评分
评分
评分
评分
假期里自我要求一天10%的进度,终于看到接近70%,力荐这本书,知其然知其所以然。 恶意软件相关的病毒 蠕虫 木马 后门 rootkit等内容从基本原理开始,讲解思路清晰详尽
评分假期里自我要求一天10%的进度,终于看到接近70%,力荐这本书,知其然知其所以然。 恶意软件相关的病毒 蠕虫 木马 后门 rootkit等内容从基本原理开始,讲解思路清晰详尽
评分假期里自我要求一天10%的进度,终于看到接近70%,力荐这本书,知其然知其所以然。 恶意软件相关的病毒 蠕虫 木马 后门 rootkit等内容从基本原理开始,讲解思路清晰详尽
评分假期里自我要求一天10%的进度,终于看到接近70%,力荐这本书,知其然知其所以然。 恶意软件相关的病毒 蠕虫 木马 后门 rootkit等内容从基本原理开始,讲解思路清晰详尽
评分假期里自我要求一天10%的进度,终于看到接近70%,力荐这本书,知其然知其所以然。 恶意软件相关的病毒 蠕虫 木马 后门 rootkit等内容从基本原理开始,讲解思路清晰详尽
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等
© 2025 book.wenda123.org All Rights Reserved. 图书目录大全 版权所有