Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Grimes, Roger A.

Title Malicious mobile code : virus protection for Windows / Roger A. Grimes. [O'Reilly electronic resource]

Edition 1st ed.
Imprint Sebastopol, CA : O'Reilly & Associates, 2001.
QR Code
Description 1 online resource (xviii, 522 pages) : illustrations
Note Includes index.
Access Use copy Restrictions unspecified star MiAaHDL
Reproduction Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL
System Details Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
Processing Action digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Contents Hunt 1 -- What Is Malicious Mobile Code? 2 -- Malicious Code and the Law 11 -- Malicious Code-Writing Subculture 13 -- MMC Terminology 20 -- 2. DOS Computer Viruses 22 -- DOS Technologies 23 -- DOS Virus Technologies 32 -- Types of DOS Viruses 33 -- Virus Defense Mechanisms 43 -- Examples of DOS Viruses 48 -- Detecting a DOS-Based Computer Virus 50 -- Removing a DOS Virus 53 -- Protecting Yourself from Viruses 55 -- 3. Windows Technologies 59 -- Windows Technologies 59 -- New Windows Versions 86 -- 4. Viruses in a Windows World 93 -- DOS Viruses on Windows Platforms 93 -- Windows Viruses on Windows Platforms 99 -- Signs and Symptoms of Windows NT Virus Infections 102 -- Windows Virus Examples 105 -- Detecting a Windows Virus 111 -- Removing Viruses 118 -- Removing Infected Files 121 -- Preventing Viruses in Windows 125 -- Future 128 -- 5. Macro Viruses 130 -- What Is a Macro Virus? 131 -- Microsoft Word and Excel Macros 135 -- Working with Macros 138 -- Office 2000 Security 143 -- Macro Virus Technologies 147 -- Macro Virus Examples 157 -- Detecting Macro Viruses 160 -- Removing Macro Viruses and Repairing the Damage 166 -- Preventing Macro Viruses 173 -- 6. Trojans and Worms 180 -- Threat 180 -- What Are Trojan Horses and Worms? 182 -- Signs and Symptoms 184 -- Types of Trojans 184 -- Trojan Technology 191 -- Becoming Familiar with Your PC 194 -- Trojan and Worm Examples 199 -- Detecting and Removing Trojans and Worms 208 -- Preventing Trojans and Worms 221 -- 7. Instant Messaging Attacks 226 -- Introduction to Instant Messaging 226 -- Types of Instant Messaging 228 -- Introduction to Internet Relay Chat 230 -- Hacking Instant Messaging 235 -- Examples of IRC Attacks 242 -- Detecting Malicious IM 246 -- Removing Malicious IM 247 -- Protecting Yourself from IM Attacks 248 -- 8. Internet Browser Technologies 251 -- Browser Technologies 253 -- Web Languages 259 -- Other Browser Technologies 266 -- When to Worry About Browser Content 274 -- 9. Internet Browser Attacks 276 -- Browser-Based Exploits 276 -- Examples of Attacks and Exploits 277 -- Detecting Internet Browser Attacks 293 -- Removing and Repairing the Damage 295 -- Preventing Internet Browser Attacks 295 -- 10. Malicious Java Applets 306 -- Java 306 -- Java Security 311 -- Java Exploits 319 -- Example Java Exploits 322 -- Detecting Malicious Java Applets 328 -- Removing Malicious Java Code 331 -- Protecting Yourself from Malicious Java Code 332 -- 11. Malicious ActiveX Controls 341 -- ActiveX 341 -- ActiveX Security 346 -- ActiveX Security Criticisms 362 -- Malicious ActiveX Examples 365 -- Detecting Malicious ActiveX Controls 370 -- Removing and Preventing Malicious Active Controls 371 -- 12. Email Attacks 383 -- Email Programs 384 -- Email Exploits 394 -- Detecting Email Attacks 398 -- Removing Infected Email 399 -- Preventing Email Attacks 403 -- 13. Hoax Viruses 418 -- Mother of All Computer Viruses 418 -- Categories of Hoax Messages 422 -- Detection 427 -- Removing and Preventing Hoax Viruses 432 -- 14. Defense 435 -- Defense Strategy 435 -- Malicious Mobile Code Defense Plan 436 -- Use a Good Antivirus Scanner 447 -- Antivirus Scanning Locations 455 -- Best Steps Toward Securing Any Windows PC 461 -- Additional Defense Tools 464 -- Antivirus Product Review 471 -- Future 475 -- 15. Future 477 -- Future of Computing 477 -- MMC Exploits 483 -- Real Defense Solutions 486.
Subject Computer viruses.
Computer security.
Computer Security
Virus informatiques.
Sécurité informatique.
Computer security
Computer viruses
Computervirussen.
Computerbeveiliging.
Virus informatiques.
Other Form: Print version: Grimes, Roger A. Malicious mobile code. 1st ed. Sebastopol, CA : O'Reilly & Associates, 2001 156592682X (DLC) 2001033095 (OCoLC)46671214
ISBN 9781491994696 (electronic bk.)
149199469X (electronic bk.)
9781491994719 (electronic bk.)
1491994711 (electronic bk.)
9781491994702 (electronic bk.)
1491994703 (electronic bk.)
(pbk.)
(pbk.)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information