Covering the wide range of technologies implemented by contemporary malware programs, such as rootkits, keyloggers, spyware, adware, back doors, and network and mail worms, this is a practical guide... This description may be from another edition of this product.