Computer worms: Email worms, Exploit-based worms, Morris worm, Computer worm, SQL Slammer, Klez, Badtrans, Sircam, Code Red, Stuxnet, Conficker

 
9781157062868: Computer worms: Email worms, Exploit-based worms, Morris worm, Computer worm, SQL Slammer, Klez, Badtrans, Sircam, Code Red, Stuxnet, Conficker
From the Publisher:

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 42. Chapters: Email worms, Exploit-based worms, Morris worm, Computer worm, SQL Slammer, Klez, Badtrans, Sircam, Code Red, Stuxnet, Conficker, Mydoom, ILOVEYOU, Happy99, Zotob, WANK, Koobface, Blaster, List of computer worms, Sasser, Sober, CTX, XSS worm, RavMonE.exe, Agobot, Bagle, Leap, Daprosy Worm, Brontok, Sobig, Anti-worm, Stration, Nimda, Psyb0t, Witty, Code Red II, Blackworm, Here you have, Welchia, Samy, Mumu, Spybot worm, Voyager, Mylife, Netsky, Warhol worm, Backdoor.Win32.IRCBot, Looksky, Kama Sutra, Sadmind, Santy, Hybris, ExploreZip, Badbunny, Devnull, Nurech.b, Nyxem Worm, NewLove, Bad Sectors 1.2, Pikachu virus, Ramen worm, Kak worm, W32.Gammima.AG, Mikeyy, Ares.exe, Toxbot, Helpful worm, Upering, W32/Storm.worm, Gaobot.ee, Doomjuice, Bolgimo, Father Christmas, Yamanner, Alcra, L10n worm, Mimail, Redesi, Gokar, Navidad virus, Dabber. Excerpt: Stuxnet is a computer worm discovered in July 2010. It targets Siemens industrial software and equipment running on Microsoft Windows. While it is not the first time that crackers have targeted industrial systems, it is the first discovered malware that spies on and subverts industrial systems, and the first to include a programmable logic controller (PLC) rootkit. The worm initially spreads indiscriminately, but includes a highly specialized malware payload that is designed to target only Siemens Supervisory Control And Data Acquisition (SCADA) systems that are configured to control and monitor specific industrial processes. Stuxnet infects PLCs by subverting the Step-7 software application that is used to reprogram these devices. Different variants of Stuxnet targeted five Iranian organizations, with the probable target widely suspected to be uranium enrichment infrastructure in Iran; Symantec noted in August 2010 that 60% of the infected computers worldwide were in Iran. S...

"Sobre este título" puede pertenecer a otra edición de este libro.

(Ningún ejemplar disponible)

Buscar:



Crear una petición

Si conoce el autor y el título del libro pero no lo encuentra en IberLibro, nosotros podemos buscarlo por usted e informarle por e-mail en cuanto el libro esté disponible en nuestras páginas web.

Crear una petición