Atnaujinkite slapukų nuostatas

El. knyga: Malicious Mobile Code: Virus Protection for Windows

3.38/5 (14 ratings by Goodreads)
  • Formatas: 542 pages
  • Išleidimo metai: 14-Aug-2001
  • Leidėjas: O'Reilly Media
  • Kalba: eng
  • ISBN-13: 9781491994702
  • Formatas: 542 pages
  • Išleidimo metai: 14-Aug-2001
  • Leidėjas: O'Reilly Media
  • Kalba: eng
  • ISBN-13: 9781491994702

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Malicious mobile code is a new term to describe all sorts of bad programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug have proved the experts wrong, attacking Windows computers when recipients do nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code that will do destructive things. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. There are effective ways to thwart Windows malicious code attacks, and Roger Grimes maps them out in this book. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a rundown on today's viruses and how to protect a system from them. He looks at ways to configure Windows for maximum protection, what a DOS virus can and cannot do, what today's biggest threats are and other important information. The book offers the strategies, tips, and tricks to secure a system against attack. It covers: the current state of the malicious code writing and cracker community in 2001; how malicious code works, what types there are, and what it can and cannot do; common anti-virus defenses, including anti-virus software; how malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent them; macro viruses affecting MS Word, MS Excel, and VBScript; Java applets and ActiveX controls; enterprise-wide malicious code protection; hoaxes; and the future of computer malicious mobile code and how to combat it.

Recenzijos

'This really is a great book for getting your head around Internet security - we wholeheartedly recommend it.' InternetWorks, November 2001 'It seems that most computer books are about 40mm thick, with approximately one third of that representing 'useful' information. O'Reilly have a reputation, as publishers, for distilling their texts so that only the 'third' is published. Malicious Mobile Code (MMC) is 25mm thick - I would hate to see the tome another publisher would have produced!' - Paul Baccas, Virus Bulletin, October 2001 "Offers excellent understanding of the subject matter" - Mike James, Computer Shopper, September 2002

Preface ix
Introduction
1(21)
The Hunt
1(1)
What Is Malicious Mobile Code?
2(9)
Malicious Code and the Law
11(2)
Malicious Code-Writing Subculture
13(7)
MMC Terminology
20(1)
Summary
21(1)
DOS Computer Viruses
22(37)
Introduction
22(1)
DOS Technologies
23(9)
DOS Virus Technologies
32(1)
Types of DOS Viruses
33(10)
Virus Defense Mechanisms
43(5)
Examples of DOS Viruses
48(2)
Detecting a DOS-Based Computer Virus
50(3)
Removing a DOS Virus
53(2)
Protecting Yourself from Viruses
55(3)
Summary
58(1)
Windows Technologies
59(34)
Windows Technologies
59(27)
New Windows Versions
86(6)
Summary
92(1)
Viruses in a Windows World
93(37)
DOS Viruses on Windows Platforms
93(6)
Windows Viruses on Windows Platforms
99(3)
Signs and Symptoms of Windows NT Virus Infections
102(3)
Windows Virus Examples
105(6)
Detecting a Windows Virus
111(7)
Removing Viruses
118(3)
Removing Infected Files
121(4)
Preventing Viruses in Windows
125(3)
Future
128(1)
Summary
128(2)
Macro Viruses
130(50)
What Is a Macro Virus?
131(4)
Microsoft Word and Excel Macros
135(3)
Working with Macros
138(5)
Office 2000 Security
143(4)
Macro Virus Technologies
147(10)
Macro Virus Examples
157(3)
Detecting Macro Viruses
160(6)
Removing Macro Viruses and Repairing the Damage
166(7)
Preventing Macro Viruses
173(6)
Summary
179(1)
Trojans and Worms
180(46)
The Threat
180(2)
What Are Trojan Horses and Worms?
182(2)
Signs and Symptoms
184(1)
Types of Trojans
184(7)
Trojan Technology
191(3)
Becoming Familiar with Your PC
194(5)
Trojan and Worm Examples
199(9)
Detecting and Removing Trojans and Worms
208(13)
Preventing Trojans and Worms
221(4)
Summary
225(1)
Instant Messaging Attacks
226(25)
Introduction to Instant Messaging
226(2)
Types of Instant Messaging
228(2)
Introduction to Internet Relay Chat
230(5)
Hacking Instant Messaging
235(7)
Examples of IRC Attacks
242(4)
Detecting Malicious IM
246(1)
Removing Malicious IM
247(1)
Protecting Yourself from IM Attacks
248(2)
Summary
250(1)
Internet Browswer Technologies
251(25)
Introduction
251(2)
Browser Technologies
253(6)
Web Languages
259(7)
Other Browser Technologies
266(8)
When to Worry About Browser Content
274(1)
Summary
275(1)
Internet Browser Attacks
276(30)
Browser-Based Exploits
276(1)
Examples of Attacks and Exploits
277(16)
Detecting Internet Browser Attacks
293(2)
Removing and Repairing the Damage
295(1)
Preventing Internet Browser Attacks
295(10)
Summary
305(1)
Malicious Java Applets
306(35)
Java
306(5)
Java Security
311(8)
Java Exploits
319(3)
Example Java Exploits
322(6)
Detecting Malicious Java Applets
328(3)
Removing Malicious Java Code
331(1)
Protecting Yourself from Malicious Java Code
332(8)
Summary
340(1)
Malicious ActiveX Controls
341(42)
ActiveX
341(5)
ActiveX Security
346(16)
ActiveX Security Criticisms
362(3)
Malicious ActiveX Examples
365(5)
Detecting Malicious ActiveX Controls
370(1)
Removing and Preventing Malicious Active Controls
371(11)
Summary
382(1)
Email Attacks
383(35)
Introduction
383(1)
Email Programs
384(10)
Email Exploits
394(4)
Detecting Email Attacks
398(1)
Removing Infected Email
399(4)
Preventing Email Attacks
403(14)
Summary
417(1)
Hoax Viruses
418(17)
The Mother of All Computer Viruses
418(4)
Categories of Hoax Messages
422(5)
Detection
427(5)
Removing and Preventing Hoax Viruses
432(2)
Summary
434(1)
Defense
435(42)
Defense Strategy
435(1)
Malicious Mobile Code Defense Plan
436(11)
Use a Good Antivirus Scanner
447(8)
Antivirus Scanning Locations
455(6)
The Best Steps Toward Securing Any Windows PC
461(3)
Additional Defense Tools
464(7)
Antivirus Product Review
471(4)
Future
475(1)
Summary
475(2)
The Future
477(16)
The Future of Computing
477(6)
MMC Exploits
483(3)
Real Defense Solutions
486(6)
Summary
492(1)
Index 493


Roger A. Grimes is the principal of a firm specializing in client/server networking technologies, and he has been providing professional anti-virus consulting services for nine years. His clients have included some of the nation's largest banks, universities, and the U.S. Navy. He has also written dozens of magazine and newspaper articles on technical subjects.