Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization
- 300pages
- 11 heures de lecture
Covering the wide range of technologies implemented by contemporary malware programs such as rootkits, keyloggers, spyware, adware, back doors, and network and mail worms, this practical guide for system administrators and experienced users covers approaches to computer investigation and how to locate and destroy malicious programs without using antiviral software.
