Part I: STRATEGIES OF THE ATTACKERChapter 1. Introduction to the Games of NatureChapter 2. The Fascination of Malicious Code AnalysisChapter 3. Malicious Code EnvironmentsChapter 4. Classification of Infection StrategiesChapter 5. Classification of In-Memory StrategiesChapter 6. Basic Self-Protection StrategiesChapter 7. Advanced Code Evolution Techniques and Computer Virus Generator KitsChapter 8. Classification According to PayloadChapter 9. Strategies of Computer WormsChapter 10. Exploits, Vulnerabilities, and Buffer Overflow Attacks