menu
{ "item_title" : "Guide to Malware Incident Prevention and Handling for Desktops and Laptops", "item_author" : [" U. S. Department of Commerce "], "item_description" : "Malware, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim's data, applications, or operating system. Malware is the most common external threat to most hosts, causing widespread damage and disruption and necessitating extensive recovery efforts within most organizations. Organizations also face similar threats from a few forms of non-malware threats that are often associated with malware. One of these forms that has become commonplace is phishing, which is using deceptive computer-based means to trick individuals into disclosing sensitive information.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/1/50/031/178/1500311782_b.jpg", "price_data" : { "retail_price" : "16.99", "online_price" : "16.99", "our_price" : "16.99", "club_price" : "16.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Guide to Malware Incident Prevention and Handling for Desktops and Laptops|U. S. Department of Commerce

Guide to Malware Incident Prevention and Handling for Desktops and Laptops

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Malware, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim's data, applications, or operating system. Malware is the most common external threat to most hosts, causing widespread damage and disruption and necessitating extensive recovery efforts within most organizations. Organizations also face similar threats from a few forms of non-malware threats that are often associated with malware. One of these forms that has become commonplace is phishing, which is using deceptive computer-based means to trick individuals into disclosing sensitive information.

This item is Non-Returnable

Details

  • ISBN-13: 9781500311780
  • ISBN-10: 1500311782
  • Publisher: Createspace Independent Publishing Platform
  • Publish Date: June 2014
  • Dimensions: 11.02 x 8.5 x 0.1 inches
  • Shipping Weight: 0.3 pounds
  • Page Count: 48

Related Categories

You May Also Like...

    1

BAM Customer Reviews