References

Trojan

Charles P.Pfleeger & Shari Lawrence Pfleeger. (2012). Analyzing Computer Security : A Threat/Vulnerability/Countermeasure Approach. Prentice Hall. Pearson.

Michael A. Davis, Sean M.Bodmer, Aron. (2010). Hacking Exposed: Malware and Rootkits. United State. Mc Graw Hill.

Micheal T. Goodrich & Roberto Tamassia. (2011). Introduction to Computer Security.  Pearson

https://usa.kaspersky.com/internet-security-center/threats/trojans

https://sites.psu.edu/trojanblog/

 

Virus

Chuck Easttom (2006), Computer Security Fundamentals, Pearson Prentice Hall.Pearson.

Arman Danesh, Ali Mehrassa, Felix Lau (2002), Safe and Secure: Secure Your Home Network and Protect Your Privacy Online. Sams Publishing.

Top 5 Sources of Computer Virus Attack

 

Rootkit

http://www.spamlaws.com/how-rootkits-work.html

https://technet.microsoft.com/en-us/sysinternals/rootkitrevealer.aspx

http://www.veracode.com/security/rootkit

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s