Text
Malware: fighting malicious code
Table of contents:
Ch. 1. Introduction
Ch. 2. Viruses
Ch. 3. Worms
Ch. 4. Malicious Mobile Code
Ch. 5. Backdoors
Ch. 6. Trojan Horses
Ch. 7. User-Mode RootKits
Ch. 8. Kernel-Mode RootKits
Ch. 9. Going Deeper
Ch. 10. Scenarios
Ch. 11. Malware Analysis
Ch. 12. Conclusion
No other version available