Introduction - If you have any usage issues, please Google them yourself
Book is closely linked with the network and system security through a large number of instances of a comprehensive analysis of computer viruses and Trojan horses involved in various technologies and means of attack, a detailed analysis of the source code of computer viruses and Trojan horses, in-depth prevention of network attacks and removal technology to allow readers to truly know ourselves, to achieve the purpose of prevention. Readers through book learning, network security, more in-depth understanding of a variety of techniques and methods involved in computer viruses and Trojan horses understanding of the system, network and information security management work independently, be able to write network security management procedure. Book combining theory and practice applicable to the majority of software engineers, network enthusiasts, network programmers, network administrators, students of the University computer software professionals and network of professional and personnel