Cover procedures and practices for everything from social engineering to effectively configuring an intrusion detection system. * Author provides the benefit of his day-to-day practices as a security expert. * Companion Website features several non-shareware products for effectively defending against malicious code.A Complete Guide to Defending Against Viruses, Worms, and Trojans Douglas Schweitzer ... 23-24 software solutions, Web sites for, 261-264 SOFTWIN, 134 Solaris operating system, 115, 305 solutions, Web sites for, 261-264 ... 74 Strange Brew virus, 100 Stream virus, 78-79 student, college, 16-17 subdirectory, 79-83 subscribersa#39; information, 270 SubSeven ... 74, 159, 175, 251 Symbian Ltd., 244 symptoms of infected system, 155 System Administration, Networking and Securityanbsp;...
|Title||:||Securing the Network from Malicious Code|
|Publisher||:||Wiley - 2002-10-03|