Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion