Catalogue

Record Details

Catalogue Search


Back To Results
Showing Item 4 of 23
Preferred library: Fraser Lake Public Library?

Malicious mobile code : virus protection for Windows  Cover Image E-book E-book

Malicious mobile code : virus protection for Windows

Grimes, Roger A. (Author).

Record details

  • ISBN: 9781565926820
  • ISBN: 156592682X
  • ISBN: 1491994703
  • ISBN: 9781491994702
  • ISBN: 1491994711
  • ISBN: 9781491994719
  • ISBN: 149199469X
  • ISBN: 9781491994696
  • Physical Description: 1 online resource (xviii, 522 pages) : illustrations
    remote
  • Edition: 1st ed.
  • Publisher: Sebastopol, CA : O'Reilly & Associates, 2001.

Content descriptions

General Note:
Includes index.
Formatted Contents Note: Hunt 1 -- What Is Malicious Mobile Code? 2 -- Malicious Code and the Law 11 -- Malicious Code-Writing Subculture 13 -- MMC Terminology 20 -- 2. DOS Computer Viruses 22 -- DOS Technologies 23 -- DOS Virus Technologies 32 -- Types of DOS Viruses 33 -- Virus Defense Mechanisms 43 -- Examples of DOS Viruses 48 -- Detecting a DOS-Based Computer Virus 50 -- Removing a DOS Virus 53 -- Protecting Yourself from Viruses 55 -- 3. Windows Technologies 59 -- Windows Technologies 59 -- New Windows Versions 86 -- 4. Viruses in a Windows World 93 -- DOS Viruses on Windows Platforms 93 -- Windows Viruses on Windows Platforms 99 -- Signs and Symptoms of Windows NT Virus Infections 102 -- Windows Virus Examples 105 -- Detecting a Windows Virus 111 -- Removing Viruses 118 -- Removing Infected Files 121 -- Preventing Viruses in Windows 125 -- Future 128 -- 5. Macro Viruses 130 -- What Is a Macro Virus? 131 -- Microsoft Word and Excel Macros 135 -- Working with Macros 138 -- Office 2000 Security 143 -- Macro Virus Technologies 147 -- Macro Virus Examples 157 -- Detecting Macro Viruses 160 -- Removing Macro Viruses and Repairing the Damage 166 -- Preventing Macro Viruses 173 -- 6. Trojans and Worms 180 -- Threat 180 -- What Are Trojan Horses and Worms? 182 -- Signs and Symptoms 184 -- Types of Trojans 184 -- Trojan Technology 191 -- Becoming Familiar with Your PC 194 -- Trojan and Worm Examples 199 -- Detecting and Removing Trojans and Worms 208 -- Preventing Trojans and Worms 221 -- 7. Instant Messaging Attacks 226 -- Introduction to Instant Messaging 226 -- Types of Instant Messaging 228 -- Introduction to Internet Relay Chat 230 -- Hacking Instant Messaging 235 -- Examples of IRC Attacks 242 -- Detecting Malicious IM 246 -- Removing Malicious IM 247 -- Protecting Yourself from IM Attacks 248 -- 8. Internet Browser Technologies 251 -- Browser Technologies 253 -- Web Languages 259 -- Other Browser Technologies 266 -- When to Worry About Browser Content 274 -- 9. Internet Browser Attacks 276 -- Browser-Based Exploits 276 -- Examples of Attacks and Exploits 277 -- Detecting Internet Browser Attacks 293 -- Removing and Repairing the Damage 295 -- Preventing Internet Browser Attacks 295 -- 10. Malicious Java Applets 306 -- Java 306 -- Java Security 311 -- Java Exploits 319 -- Example Java Exploits 322 -- Detecting Malicious Java Applets 328 -- Removing Malicious Java Code 331 -- Protecting Yourself from Malicious Java Code 332 -- 11. Malicious ActiveX Controls 341 -- ActiveX 341 -- ActiveX Security 346 -- ActiveX Security Criticisms 362 -- Malicious ActiveX Examples 365 -- Detecting Malicious ActiveX Controls 370 -- Removing and Preventing Malicious Active Controls 371 -- 12. Email Attacks 383 -- Email Programs 384 -- Email Exploits 394 -- Detecting Email Attacks 398 -- Removing Infected Email 399 -- Preventing Email Attacks 403 -- 13. Hoax Viruses 418 -- Mother of All Computer Viruses 418 -- Categories of Hoax Messages 422 -- Detection 427 -- Removing and Preventing Hoax Viruses 432 -- 14. Defense 435 -- Defense Strategy 435 -- Malicious Mobile Code Defense Plan 436 -- Use a Good Antivirus Scanner 447 -- Antivirus Scanning Locations 455 -- Best Steps Toward Securing Any Windows PC 461 -- Additional Defense Tools 464 -- Antivirus Product Review 471 -- Future 475 -- 15. Future 477 -- Future of Computing 477 -- MMC Exploits 483 -- Real Defense Solutions 486.
Restrictions on Access Note:
Restrictions unspecified
Reproduction Note:
Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010.
System Details Note:
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212
Action Note:
digitized 2010 HathiTrust Digital Library committed to preserve
Source of Description Note:
Print version record.
Subject: Computer viruses
Computer security
Computer Security
Virus informatiques
Sécurité informatique
COMPUTERS -- Security -- Viruses
Computer security
Computer viruses
Computervirussen
Computerbeveiliging
Virus informatiques
Genre: Electronic book.
Electronic books.

Back To Results
Showing Item 4 of 23
Preferred library: Fraser Lake Public Library?

Additional Resources