What people are saying - Write a review
We haven't found any reviews in the usual places.
SELECTING ANTIVIRUS TECHNIQUES
SELECTING THE RIGHT TOOL
5 other sections not shown
Other editions - View all
access control shell Administrative Overhead anti-virus tools application attack backup change detection checksum program classes of tools computer environment computer security computer systems computer users computer viruses configuration contain and recover contingency procedures copy damage database detection tools directories disinfected disk diskettes document encryption end-user error example false negatives false positives files function guidance hardware hidden code infected executable installed LAN server malicious software modified multi-user computer multi-user systems network servers network worm occur operating system organization password password cracking perform personal computer networks policies and procedures precise identification tools problems protection purpose monitors related threats removal tools require result scanners security policies Selection Factors shareware software management software repositories specific system manager system utilities technical controls techniques Trojan horse program types unauthorized users updates user authentication user education user's variant Virus Bulletin virus detection virus infection virus prevention virus signature viruses and related vulnerabilities