This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec.
Introduction.- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks.- Country by Country Analysis.