Malware: Fighting Malicious Code
©2004 |Prentice Hall | Available
with Lenny Zeltser
©2004 |Prentice Hall | Available
Malicious code is a set of instructions that runs on your computer and makes
your system do something that you do not want it to do. For example, it can
delete sensitive configuration files from your hard drive, rendering your
computer completely inoperable; infect your computer and use it as a jumpingoff
point to spread to all of your buddies' computers; and steal files from your
machine. Malicious code in the hands of a crafty attacker is indeed powerful.
It's becoming even more of a problem because many of the very same factors
fueling the evolution of the computer industry are making our systems even
more vulnerable to malicious code. Specifically, malicious code writers benefit
from the trends toward mixing static data and executable instructions,
increasingly homogenous computing environments, unprecedented
connectivity, an ever-larger clueless user base, and an unfriendly world. Skoudis
addressed malicious code in just one chapter of his previous book. Here, a
dozen chapters focus on one of the most interesting and rapidly developing
areas of computer attacks.
*Chapter 11, "Defender's Toolbox," rolls together the defensive strategies
described in the book. As a bonus, Skoudis gives recipes for creating your own
malicious code analysis laboratory using cheap hardware and software.
*Foreword by Gene Schultz, security inspector for Global Integrity.
Sample chapter is available for download in PDF format.
This material is protected under all copyright laws, as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher.
Computer security expert and highly acclaimed author Ed Skoudis focuses on one of the biggest areas of computer attacks--malicious code.
° Real-world tools needed to prevent, detect, and handle malicious code attacks.
° Computer infection from viruses, worms, Trojan Horses etc., collectively known as malware is a growing cost problem for businesses.
° Discover how attackers install malware and how you can peer through their schemes to keep systems safe.
° Bonus malware code analysis laboratory.
Pearson offers special pricing when you package your text with other student resources. If you're interested in creating a cost-saving package for your students, contact your Pearson rep.
ED SKOUDIS is a computer security consultant with International Network Services. Ed's expertise includes hacker attacks and defenses, the information security industry, and computer privacy issues. He has performed numerous security assessments, designed secure network architectures, and responded to computer attacks. A frequent speaker on issues associated with hacker tools and effective defenses, Ed has published several articles, as well as the highly acclaimed Counter Attack: A Step-by-Step Guide to Computer Attacks and Effective Defenses (Prentice Hall PTR, 2001).
We're sorry! We don't recognize your username or password. Please try again.
The work is protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning.
You have successfully signed out and will be required to sign back in should you need to download more resources.