(This book is closely related to network and system security. It comprehensively analyzes various technologies and attack methods involved in computer viruses and Trojan horses through many examples, and analyzes the program source codes of computer viruses and Trojan horses in detail. The prevention and removal techniques of these network attacks are analyzed, so that readers can truly know themselves and know the waves, and realize the intention of prevention. By studying this book, readers can have a deeper understanding of network security, and have a better understanding of computer viruses and Trojan horses. Have a systematic understanding of various technologies and methods, can independently realize the management and office of network information security, can write network security management programs, this book combines theory and practice, suitable for the majority of software engineers, network enthusiasts, network programmers, Network administrators, university computer software majors and network majors, and personnel engaged in information security offices.
[Analysis of Computer Virus and Trojan Horse Program].Scanned Version.pdf
.....)