biss boutiques-francophones Learn more vpcflyout Furniture All-New Kindle Paperwhite Own the 2016 GRAMMY Nominee Album featuring the Biggest Hits from Music's Biggest Night Exercice Tools ca_ty_gno

Vous voulez voir cette page en français ? Cliquez ici.

Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans [Paperback]

Douglas Schweitzer
4.3 out of 5 stars  See all reviews (11 customer reviews)
Price: CDN$ 58.02 & FREE Shipping. Details
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Temporarily out of stock.
Order now and we'll deliver when available. We'll e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged when we ship the item.
Ships from and sold by Gift-wrap available.
‹  Return to Product Overview

Inside This Book

(Learn More)
First Sentence
WHETHER MODERN DAY MALICIOUS code takes the form of a virus, worm, or Trojan horse program, it poses a real threat to organizational networks, causing damage that is often debilitating. Read the first page
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Concordance (Learn More)
These are the most frequently used words in this book.
access  address  against  allow  applications  attacks  available  boot  browser  business  called  cause  chapter  click  code  companies  computer  control  critical  damage  data  defense  devices  disk  drive  even  example  features  file  firewall  first  following  government  hackers  hard  horse  however  include  individuals  infected  information  internet  known  malicious  may  messages  microsoft  must  name  need  network  new  number  often  open  operating  organizations  part  password  pc  personal  policies  ports  products  programs  protection  provide  result  run  scripts  security  server  service  several  should  site  software  spread  system  take  technology  threats  time  tools  trojan  two  type  use  used  users  version  virus  viruses  vulnerabilities  web  windows  wireless  worm  www  years 
‹  Return to Product Overview