Caution! Wireless Networking: Preventing a Data Disaster
In This Chapter
-
Malicious software explained
-
Investigating computer viruses
-
Digging up Internet worms
-
Explaining blended threats
-
Introducing bot software
-
Revealing Trojan programs
-
Exposing spyware
-
Examining viruses on handheld devices
-
Revealing the hoax problem
Категории