Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers:
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Preface; About This Book; Why Another Book on Viruses?; What This Book Doesn’t Cover; Organization of the Book; Conventions Used in This Book; Software Covered in This Book; Comments and Questions; Acknowledgments; Chapter 1: Introduction; 1.1 The Hunt; 1.2 What Is Malicious Mobile Code?; 1.3 Malicious Code and the Law; 1.4 Malicious Code-Writing Subculture; 1.5 MMC Terminology; 1.6 Summary; Chapter 2: DOS Computer Viruses; 2.1 Introduction; 2.2 DOS Technologies; 2.3 DOS Virus Technologies; 2.4 Types of DOS Viruses; 2.5 Virus Defense Mechanisms; 2.6 Examples of DOS Viruses; 2.7 Detecting a DOS-Based Computer Virus; 2.8 Removing a DOS Virus; 2.9 Protecting Yourself from Viruses; 2.10 Risk Assessment -- Low; 2.11 Summary; Chapter 3: Windows Technologies; 3.1 Windows Technologies; 3.2 New Windows Versions; 3.3 Summary; Chapter 4: Viruses in a Windows World; 4.1 DOS Viruses on Windows Platforms; 4.2 Windows Viruses on Windows Platforms; 4.3 Signs and Symptoms of Windows NT Virus Infections; 4.4 Windows Virus Examples; 4.5 Detecting a Windows Virus; 4.6 Removing Viruses; 4.7 Removing Infected Files; 4.8 Preventing Viruses in Windows; 4.9 Future; 4.10 Risk Assessment -- Medium; 4.11 Summary; Chapter 5: Macro Viruses; 5.1 Microsoft Office Version Numbers; 5.2 What Is a Macro Virus?; 5.3 Microsoft Word and Excel Macros; 5.4 Working with Macros; 5.5 Office 2000 Security; 5.6 Macro Virus Technologies; 5.7 Macro Virus Examples; 5.8 Detecting Macro Viruses; 5.9 Removing Macro Viruses and Repairing the Damage; 5.10 Preventing Macro Viruses; 5.11 Risk Assessment -- High; 5.12 Summary; Chapter 6: Trojans and Worms; 6.1 The Threat; 6.2 What Are Trojan Horses and Worms?; 6.3 Signs and Symptoms; 6.4 Types of Trojans; 6.5 Trojan Technology; 6.6 Becoming Familiar with Your PC; 6.7 Trojan and Worm Examples; 6.8 Detecting and Removing Trojansand Worms; 6.9 Preventing Trojans and Worms; 6.10 Risk Assessment -- High; 6.11 Summary; Chapter 7: Instant Messaging Attacks; 7.1 Introduction to Instant Messaging; 7.2 Types of Instant Messaging; 7.3 Introduction to Internet Relay Chat; 7.4 Hacking Instant Messaging; 7.5 Examples of IRC Attacks; 7.6 Detecting Malicious IM; 7.7 Removing Malicious IM; 7.8 Protecting Yourself from IM Attacks; 7.9 Risk Assessment -- Medium; 7.10 Summary; Chapter 8: Internet Browser Technologies; 8.1 Introduction; 8.2 Browser Technologies; 8.3 Web Languages; 8.4 Other Browser Technologies; 8.5 When to Worry About Browser Content; 8.6 Summary; Chapter 9: Internet Browser Attacks; 9.1 Browser-Based Exploits; 9.2 Examples of Attacks and Exploits; 9.3 Detecting Internet Browser Attacks; 9.4 Removing and Repairing the Damage; 9.5 Preventing Internet Browser Attacks; 9.6 Risk Assessment -- Medium; 9.7 Summary; Chapter 10: Malicious Java Applets; 10.1 Java; 10.2 Java Security; 10.3 Java Exploits; 10.4 Example Java Exploits; 10.5 Detecting Malicious Java Applets; 10.6 Removing Malicious Java Code; 10.7 Protecting Yourself from Malicious Java Code; 10.8 Risk Assessment -- Low; 10.9 Summary; Chapter 11: Malicious ActiveX Controls; 11.1 ActiveX; 11.2 ActiveX Security; 11.3 ActiveX Security Criticisms; 11.4 Malicious ActiveX Examples; 11.5 Detecting Malicious ActiveX Controls; 11.6 Removing and Preventing Malicious Active Controls; 11.7 Risk Assessment -- Medium; 11.8 Summary; Chapter 12: Email Attacks; 12.1 Introduction; 12.2 Email Programs; 12.3 Email Exploits; 12.4 Detecting Email Attacks; 12.5 Removing Infected Email; 12.6 Preventing Email Attacks; 12.7 Risk Assessment -- High; 12.8 Summary; Chapter 13: Hoax Viruses; 13.1 The Mother of All Computer Viruses; 13.2 Categories of Hoax Messages; 13.3 Detection; 13.4 Removing and Preventing Hoax Viruses; 13.5 Risk Assessment -- Low; 13.6 Summary; Chapter 14: Defense; 14.1 Defense Strategy; 14.2 Malicious Mobile Code Defense Plan; 14.3 Use a Good Antivirus Scanner; 14.4 Antivirus Scanning Locations; 14.5 The Best Steps Toward Securing Any Windows PC; 14.6 Additional Defense Tools; 14.7 Antivirus Product Review; 14.8 Future; 14.9 Summary; Chapter 15: The Future; 15.1 The Future of Computing; 15.2 MMC Exploits; 15.3 Real Defense Solutions; 15.4 Summary; Colophon;
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 11,15 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 11,45 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.75. Codice articolo G156592682XI4N00
Quantità: 1 disponibili
Da: Bahamut Media, Reading, Regno Unito
Paperback. Condizione: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Codice articolo 6545-9781565926820
Quantità: 1 disponibili
Da: AwesomeBooks, Wallingford, Regno Unito
Paperback. Condizione: Very Good. Malicious Mobile Code: Virus Protection for Windows This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Codice articolo 7719-9781565926820
Quantità: 1 disponibili
Da: Ammareal, Morangis, Francia
Softcover. Condizione: Bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2001. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Slight signs of wear on the cover. Edition 2001. Ammareal gives back up to 15% of this item's net price to charity organizations. Codice articolo D-632-388
Quantità: 1 disponibili
Da: Wonder Book, Frederick, MD, U.S.A.
Condizione: Good. Good condition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Codice articolo S18M-00200
Quantità: 1 disponibili
Da: Wonder Book, Frederick, MD, U.S.A.
Condizione: Very Good. Very Good condition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp. Bundled media such as CDs, DVDs, floppy disks or access codes may not be included. Codice articolo S11N--00434
Quantità: 1 disponibili
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Malicious Mobile Code: Virus Protection for Windows 1.88. Book. Codice articolo BBS-9781565926820
Quantità: 5 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 529488-n
Quantità: 1 disponibili
Da: moluna, Greven, Germania
Condizione: New. This text provides the strategies, tips and tricks needed to secure a Windows system from viruses. It teaches what viruses can and cannot do and how to recognize, remove, and prevent them.Malicious mobile code is a new term to describe all sorts of dest. Codice articolo 596324855
Quantità: 1 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition. Codice articolo 529488
Quantità: 1 disponibili