Provides information on defending enterprise networks from sophisticated and malicious spyware. This book begins by examining the various types of insidious spyware and adware that propagate across the internet and infiltrate enterprise networks. It also aims to uncover spywares' intricate economy and network of malicious hackers and criminals.
Contents
An overview of spyware -- The transformation of spyware -- Spyware and the enterprise network -- Real spyware : crime, economic espionage, and espionage -- Solutions for the end user -- Forensic detection and removal -- Dealing with spyware in a non-Microsoft world -- The frugal engineer's guide to spyware prevention.