Examines the discovery of the Stuxnet worm which has raised several issues for Congress, including the effect on national security, what the government's response should be, whether an international treaty to curb the use of malicious software is necessary, and how such a treaty could be implemented.
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. This title provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. It includes fresh exploits through various case studies.
Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. This work helps you: understand the risks and analyze your PC's condition; select, install, and configure antivirus software; scan your computer and e-mail; rid your computer of viruses it's already caught; and more.
Covers the field of 'live forensics', where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. This book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code.