Malicious software detection and defenses including tripwire, Bit9, and other techniques such as signature and hash algorithms. Viruses, worms and Trojan horses, logic bombs, malicious web server scripts and software. Anatomy of well-known viruses and worms. Mobile code issues. Methodologies used by the anti-virus/spyware vendors and freeware.