Abstract
One of the biggest headaches that come along with networked and internet-connected computers is the absolute requirement of dealing with malicious code attacks (Erbschloe 2004). There is no choice; if your systems are not equipped in some way with antivirus protection, sooner or later some bug will eat them. There is also very little to be gained by whining about how vulnerable computer systems are to malicious code attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
J. Aycock, Computer Viruses and Malware: Advances in Information Security (Springer, New York, 2010)
M. Erbschloe, Trojans, Worms, and Spyware: A Computer Security Professional’s Guide to Malicious Code (Butterworth-Heinemann, New York, 2004)
N. Falliere, Stuxnet introduces the first known rootkit for industrial control systems (2010), http://www.symantec.com. Accessed 15 Aug 2011
B. Griffin, An introduction to viruses and malicious code: overview (2000), http://www.symantec.com. Accessed 15 Aug 2011
M. Klang, A critical look at the regulation of computer viruses. Int. J. Law Inf. Technol. 11(2) (2003)
J. Richardson, Stuxnet as cyberwarfare: applying the law of war to the virtual battlefield (2011), http://www.ssrn.com. Accessed 15 Aug 2011
D. Schweitzer, Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans (Wiley, New York, 2002)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Chawki, M., Darwish, A., Khan, M.A., Tyagi, S. (2015). Injection of Malicious Code in Application. In: Cybercrime, Digital Forensics and Jurisdiction. Studies in Computational Intelligence, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-15150-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-15150-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15149-6
Online ISBN: 978-3-319-15150-2
eBook Packages: EngineeringEngineering (R0)