Terdapat bibliografi dan indeks. Table of Contents: I. The Essentials of Network Perimeter Security 1. Perimeter Security Fundamentals 2. Packet Filtering 3. Stateful Firewalls 4. Proxy Firewalls 5. Security Policy II. Fortifying the Security Perimeter 6. The Role of a Router 7. Virtual Private Networks 8. Network Intrusion Detection 9. Host Hardening 10. Host Defense Component…
Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion