X

Sign Up




READARA
Malicious Mobile Code: Virus Protection for Windows

Overall Rating

NA

Reviews

NA

Malicious Mobile Code: Virus Protection For Windows

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy.The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out inMalicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book?Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers:

  • The current state of the malicious code writing and cracker community
  • How malicious code works, what types there are, and what it can and cannot do
  • Common anti-virus defenses, including anti-virus software
  • How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it
  • Macro viruses affecting MS Word, MS Excel, and VBScript
  • Java applets and ActiveX controls
  • Enterprise-wide malicious code protection
  • Hoaxes
  • The future of malicious mobile code and how to combat such code
These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever.Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.

O'Reilly Media

O'Reilly Media

No image

Roger A. Grimes

No of Pages
544
Publisher
O'Reilly Media
ISBN-13
9781565926820
Awards
None
Book Format
Paperback
Published Date
Aug 24, 2001

Circles

Not in any circle

Book Journey

Reviews [0]

Likes [0]

Recommends [0]

Bookshelf [0]

Table of Contents

No data Found

About Roger A. Grimes

No data Found

Other Books by Author

other books by authors
Professional Windows Desktop and Server Hardening
Professional Windows Desktop and Server Hardening
Author :
Roger A. Grimes
Publisher :
Wrox
Published Date :
May 1, 2006
No of Pages :
604
Book Format :
Paperback
Category :
Viruses
other books by authors
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Author :
Roger A. Grimes
Publisher :
Wiley
Published Date :
May 1, 2017
No of Pages :
244
Book Format :
Paperback
Category :
Viruses

More Viruses Related Books

other Related books
Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger
Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger
Author :
Eric Lawrence
Publisher :
CreateSpace Independent Publishing Platform
Published Date :
May 12, 2015
No of Pages :
368
Book Format :
Paperback
Category :
Viruses
other Related books
Accelerated Windows Malware Analysis with Memory Dumps: Training Course Transcript and Windbg Practice Exercises
Accelerated Windows Malware Analysis with Memory Dumps: Training Course Transcript and Windbg Practice Exercises
Author :
Dmitry Vostokov, Software Diagnostics Services
Publisher :
Opentask
Published Date :
Mar 1, 2013
No of Pages :
234
Book Format :
Paperback
Category :
Viruses
other Related books
Advanced Malware Analysis
Advanced Malware Analysis
Author :
Christopher Elisan
Publisher :
McGraw-Hill Education
Published Date :
Aug 21, 2015
No of Pages :
464
Book Format :
Paperback
Category :
Viruses
other Related books
Malware, Rootkits & Botnets: A Beginner's Guide (Beginner's Guide (McGraw Hill))
Malware, Rootkits & Botnets: A Beginner's Guide (Beginner's Guide (McGraw Hill))
Author :
Christopher C. Elisan
Publisher :
Mcgraw-Hill Osborne Media
Published Date :
Aug 28, 2012
No of Pages :
353
Book Format :
Paperback
Category :
Viruses
other Related books
Hacking: Hacking Essentials, What You Must Know About Hacking
Hacking: Hacking Essentials, What You Must Know About Hacking
Author :
The Hacking Boy
Publisher :
CreateSpace Independent Publishing Platform
Published Date :
Apr 19, 2015
No of Pages :
50
Book Format :
Paperback
Category :
Viruses
other Related books
Configuring SonicWALL Firewalls
Configuring SonicWALL Firewalls
Author :
Chris Lathem, Benjamin W. Fortenberry, Joshua Reed
Publisher :
Syngress
Published Date :
Jul 7, 2006
No of Pages :
600
Book Format :
Paperback
Category :
Viruses
other Related books
21st Century Chinese Cyberwarfare
21st Century Chinese Cyberwarfare
Author :
IT Governance
Publisher :
IT Governance
Published Date :
Mar 1, 2012
No of Pages :
900
Book Format :
Paperback
Category :
Viruses
other Related books
The Rootkit Arsenal: Escape and Evasion: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion: Escape and Evasion in the Dark Corners of the System
Author :
Bill Blunden
Publisher :
Jones & Bartlett Learning
Published Date :
May 4, 2009
No of Pages :
908
Book Format :
Paperback
Category :
Viruses
other Related books
99 Things You Wish You Knew Before...Your Identity Was Stolen
99 Things You Wish You Knew Before...Your Identity Was Stolen
Author :
Robert Siciliano
Publisher :
99 Series
Published Date :
Jun 1, 2014
No of Pages :
226
Book Format :
Paperback
Category :
Viruses
other Related books
Computer Forensics with FTK
Computer Forensics with FTK
Author :
Fernando Carbone
Publisher :
Packt Publishing - ebooks Account
Published Date :
Mar 24, 2014
No of Pages :
100
Book Format :
Paperback
Category :
Viruses
other Related books
Android Malware and Analysis
Android Malware and Analysis
Author :
Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
Publisher :
Auerbach Publications
Published Date :
Oct 24, 2014
No of Pages :
242
Book Format :
Hardcover
Category :
Viruses
other Related books
Secure Your Network for Free
Secure Your Network for Free
Author :
Eric Seagren
Publisher :
Syngress
Published Date :
Feb 15, 2007
No of Pages :
512
Book Format :
Paperback
Category :
Viruses
other Related books
Seven Deadliest Microsoft Attacks (Seven Deadliest Attacks)
Seven Deadliest Microsoft Attacks (Seven Deadliest Attacks)
Author :
Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern
Publisher :
Syngress
Published Date :
Mar 31, 2010
No of Pages :
192
Book Format :
Paperback
Category :
Viruses
other Related books
Verbal Aspect in New Testament Greek (Oxford Theology and Religion Monographs)
Verbal Aspect in New Testament Greek (Oxford Theology and Religion Monographs)
Author :
Buist M. Fanning
Publisher :
Clarendon Press
Published Date :
Jan 17, 1991
No of Pages :
488
Book Format :
Hardcover
Category :
Viruses
other Related books
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
Author :
Lillian Ablon, Martin C. Libicki, Andrea A. Golay
Publisher :
RAND Corporation
Published Date :
Jul 24, 2014
No of Pages :
82
Book Format :
Paperback
Category :
Viruses
other Related books
Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
Author :
Christopher Gerg, Kerry J. Cox
Publisher :
O'Reilly Media
Published Date :
Aug 12, 2004
No of Pages :
304
Book Format :
Paperback
Category :
Viruses
other Related books
Steal This Computer Book 4.0: What They Won't Tell You About the Internet
Steal This Computer Book 4.0: What They Won't Tell You About the Internet
Author :
Wallace Wang
Publisher :
No Starch Press
Published Date :
Apr 15, 2006
No of Pages :
384
Book Format :
Paperback
Category :
Viruses
other Related books
Folklore and the Internet: Vernacular Expression in a Digital World
Folklore and the Internet: Vernacular Expression in a Digital World
Author :
Darril Gibson
Publisher :
Utah State University Press
Published Date :
Sep 9, 2009
No of Pages :
272
Book Format :
Paperback
Category :
Viruses
other Related books
Protect, Backup and Clean Your PC for Seniors: Stay Safe When Using the Internet and Email and Keep Your PC in Good Condition! (Computer Books for Seniors series)
Protect, Backup and Clean Your PC for Seniors: Stay Safe When Using the Internet and Email and Keep Your PC in Good Condition! (Computer Books for Seniors series)
Author :
Studio Visual Steps
Publisher :
Visual Steps Publishing
Published Date :
Dec 18, 2014
No of Pages :
216
Book Format :
Paperback
Category :
Viruses
other Related books
Principles of Computer Security, Fourth Edition (Official Comptia Guide)
Principles of Computer Security, Fourth Edition (Official Comptia Guide)
Author :
Wm. Arthur Conklin, Greg White, Chuck Cothren, Roger Davis, Dwayne Williams
Publisher :
McGraw-Hill Education
Published Date :
Nov 22, 2015
No of Pages :
768
Book Format :
Paperback
Category :
Viruses
+

Editorial Reviews

No Editorial Reviews Available

Community Reviews

No Community Reviews Available

Press Releases

No Press Release found

Testimonials

No Data available

Market Place