| 000 | 02814nam a22005295i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-34188-0 | ||
| 003 | DE-He213 | ||
| 005 | 20250710083953.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2006 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387341880 _a99780387341880 |
||
| 024 | 7 |
_a10.1007/0-387-34188-9 _2doi |
|
| 082 | 0 | 4 |
_a005.74 _223 |
| 100 | 1 |
_aAycock, John. _eauthor. |
|
| 245 | 1 | 0 |
_aComputer Viruses and Malware _h[recurso electrónico] / _cby John Aycock. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2006. |
|
| 300 |
_aXVI, 227 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v22 |
|
| 505 | 0 | _aWe've Got Problems -- Definitions and Timeline -- Viruses -- Anti-Virus Techniques -- Anti-Anti-Virus Techniques -- Weaknesses Exploited -- Worms -- Deworming -- "Applications" -- People and Communities -- What Should we do?. | |
| 520 | _aOur Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aDATA TRANSMISSION SYSTEMS. | |
| 650 | 0 | _aCOMPUTER COMMUNICATION NETWORKS. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aCODING THEORY. | |
| 650 | 0 | _aELECTRONIC COMMERCE. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aCODING AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aELECTRONIC COMMERCE/E-BUSINESS. |
| 650 | 2 | 4 | _aCOMPUTER COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aINPUT/OUTPUT AND DATA COMMUNICATIONS. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387302362 |
| 830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v22 |
|
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/0-387-34188-9 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c57348 _d57348 |
||