Malicious Mobile Code

Malicious Mobile Code

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out inMalicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers: The current state of the malicious code writing and cracker community How malicious code works, what types there are, and what it can and cannot do Common anti-virus defenses, including anti-virus software How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it Macro viruses affecting MS Word, MS Excel, and VBScript Java applets and ActiveX controls Enterprise-wide malicious code protection Hoaxes The future of malicious mobile code and how to combat such code These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever.Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.


Author
Publisher "O'Reilly Media, Inc."
Release Date
ISBN 1491994711
Pages 542 pages
Malicious Mobile Code
Language: en
Pages: 542
Authors: Roger A. Grimes
Categories: Computers
Type: BOOK - Published: 2001-08-14 - Publisher: "O'Reilly Media, Inc."

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, e
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Language: en
Pages: 400
Authors: R.R. Brooks
Categories: Computers
Type: BOOK - Published: 2004-11-29 - Publisher: CRC Press

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature
Mobile Computing: Concepts, Methodologies, Tools, and Applications
Language: en
Pages: 3721
Authors: Taniar, David
Categories: Computers
Type: BOOK - Published: 2008-11-30 - Publisher: IGI Global

"This multiple-volume publication advances the emergent field of mobile computing offering research on approaches, observations and models pertaining to mobile
Malicious Mobile Code
Language: en
Pages: 522
Authors: Roger Grimes
Categories: Computers
Type: BOOK - Published: 2001-06 - Publisher: "O'Reilly Media, Inc."

Explains how viruses, Trojans, worms, browser exploits, and email and instant messaging attacks can impact Windows and its component applications and explores p
Department of Defense Sponsored Information Security Research
Language: en
Pages: 688
Authors: Department of Defense
Categories: Computers
Type: BOOK - Published: 2007-09-11 - Publisher: John Wiley & Sons

After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in or
Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management
Language: en
Pages: 1152
Authors: Hossein Bidgoli
Categories: Business & Economics
Type: BOOK - Published: 2006-03-13 - Publisher: John Wiley & Sons

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on in
The Handbook of Mobile Middleware
Language: en
Pages: 1377
Authors: Paolo Bellavista
Categories: Computers
Type: BOOK - Published: 2016-04-19 - Publisher: CRC Press

Device miniaturization, wireless computing, and mobile communication are driving ubiquitous, pervasive, and transparent computing. Supporting these rapidly evol
Electronic Business: Concepts, Methodologies, Tools, and Applications
Language: en
Pages: 2838
Authors: Lee, In
Categories: Computers
Type: BOOK - Published: 2008-12-31 - Publisher: IGI Global

Enhances libraries worldwide through top research compilations from over 250 international authors in the field of e-business.
Computer Security Handbook
Language: en
Pages: 1224
Authors: Seymour Bosworth
Categories: Business & Economics
Type: BOOK - Published: 2002-10-16 - Publisher: John Wiley & Sons

This is the most comprehensive book on computer security on themarket, with 23 chapters and 29 Appendices covering virtually allaspects of computer security. Ch
Amazon Hacks
Language: en
Pages: 280
Authors: Paul Bausch
Categories: Computers
Type: BOOK - Published: 2003 - Publisher: "O'Reilly Media, Inc."

Presents a collection of tips and techniques for getting the most out of Amazon.com, covering such topics as browsing and searching, community features, selling