Flylib.com
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176
Authors:
Roger A. Grimes
BUY ON AMAZON
Malicious Mobile Code: Virus Protection for Windows
Copyright
Preface
About This Book
Why Another Book on Viruses?
What This Book Doesn t Cover
Organization of the Book
Conventions Used in This Book
Software Covered in This Book
Comments and Questions
Acknowledgments
Chapter 1. Introduction
1.1 The Hunt
1.2 What Is Malicious Mobile Code?
1.3 Malicious Code and the Law
1.4 Malicious Code-Writing Subculture
1.5 MMC Terminology
1.6 Summary
Chapter 2. DOS Computer Viruses
2.1 Introduction
2.2 DOS Technologies
2.3 DOS Virus Technologies
2.4 Types of DOS Viruses
2.5 Virus Defense Mechanisms
2.6 Examples of DOS Viruses
2.7 Detecting a DOS-Based Computer Virus
2.8 Removing a DOS Virus
2.9 Protecting Yourself from Viruses
2.10 Risk Assessment -- Low
2.11 Summary
Chapter 3. Windows Technologies
3.1 Windows Technologies
3.2 New Windows Versions
3.3 Summary
Chapter 4. Viruses in a Windows World
4.1 DOS Viruses on Windows Platforms
4.2 Windows Viruses on Windows Platforms
4.3 Signs and Symptoms of Windows NT Virus Infections
4.4 Windows Virus Examples
4.5 Detecting a Windows Virus
4.6 Removing Viruses
4.7 Removing Infected Files
4.8 Preventing Viruses in Windows
4.9 Future
4.10 Risk Assessment -- Medium
4.11 Summary
Chapter 5. Macro Viruses
5.1 Microsoft Office Version Numbers
5.2 What Is a Macro Virus?
5.3 Microsoft Word and Excel Macros
5.4 Working with Macros
5.5 Office 2000 Security
5.6 Macro Virus Technologies
5.7 Macro Virus Examples
5.8 Detecting Macro Viruses
5.9 Removing Macro Viruses and Repairing the Damage
5.10 Preventing Macro Viruses
5.11 Risk Assessment -- High
5.12 Summary
Chapter 6. Trojans and Worms
6.1 The Threat
6.2 What Are Trojan Horses and Worms?
6.3 Signs and Symptoms
6.4 Types of Trojans
MalwareH2 P class
6.6 Becoming Familiar with Your PC
6.7 Trojan and Worm Examples
6.8. Detecting and Removing Trojansand Worms
6.9 Preventing Trojans and Worms
6.10 Risk Assessment -- High
6.11 Summary
Chapter 7. Instant Messaging Attacks
7.1 Introduction to Instant Messaging
7.2 Types of Instant Messaging
7.3 Introduction to Internet Relay Chat
7.4 Hacking Instant Messaging
7.6 Detecting Malicious IM
7.7 Removing Malicious IM
7.8 Protecting Yourself from IM Attacks
7.9 Risk Assessment -- Medium
7.10 Summary
Chapter 8. Internet Browser Technologies
8.1 Introduction
8.2 Browser Technologies
8.3 Web Languages
8.4 Other Browser Technologies
8.5 When to Worry About Browser Content
8.6 Summary
Chapter 9. Internet Browser Attacks
9.1 Browser-Based Exploits
9.2 Examples of Attacks and Exploits
9.3 Detecting Internet Browser Attacks
9.4 Removing and Repairing the Damage
9.5 Preventing Internet Browser Attacks
9.6 Risk Assessment -- Medium
9.7 Summary
Chapter 10. Malicious Java Applets
10.1 Java
10.2 Java Security
10.3 Java Exploits
10.4 Example Java Exploits
10.5 Detecting Malicious Java Applets
10.6 Removing Malicious Java Code
10.7 Protecting Yourself from Malicious Java Code
10.8 Risk Assessment -- Low
10.9 Summary
Chapter 11. Malicious ActiveX Controls
11.1 ActiveX
11.2 ActiveX Security
11.3 ActiveX Security Criticisms
11.4 Malicious ActiveX Examples
11.5 Detecting Malicious ActiveX Controls
11.6 Removing and Preventing Malicious Active Controls
11.7 Risk Assessment -- Medium
11.8 Summary
Chapter 12. Email Attacks
12.1 Introduction
12.2 Email Programs
12.3 Email Exploits
12.4 Detecting Email Attacks
12.5 Removing Infected Email
12.6 Preventing Email Attacks
12.7 Risk Assessment -- High
12.8 Summary
Chapter 13. Hoax Viruses
13.1 The Mother of All Computer Viruses
13.2 Categories of Hoax Messages
13.3 Detection
13.4 Removing and Preventing Hoax Viruses
13.5 Risk Assessment -- Low
13.6 Summary
Chapter 14. Defense
14.1 Defense Strategy
14.2 Malicious Mobile Code Defense Plan
14.3 Use a Good Antivirus Scanner
14.4 Antivirus Scanning Locations
14.5 The Best Steps Toward Securing Any Windows PC
14.6 Additional Defense Tools
14.7 Antivirus Product Review
14.8 Future
14.9 Summary
Chapter 15. The Future
15.1 The Future of Computing
15.2 MMC Exploits
15.3 Real Defense Solutions
15.4 Summary
Colophon
INDEX
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176
Authors:
Roger A. Grimes
BUY ON AMAZON
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Measuring ROI in E-Commerce Applications: Analysis to Action
Managing IT Functions
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Oracle Developer Forms Techniques
Obtaining Query Count Without EXECUTE-ing a Query
Summary
The Work-around for PL/SQL 2.x Limitations in Forms 4.5
Summary
When to Use the Same Trigger and How to Make It Fire at Multiple Levels
Developing Tablet PC Applications (Charles River Media Programming)
Introduction to Visual Basic .NET
Math and Random Number Functions in VB .NET
Your First Program
Advanced Microsoft Agent
3D Rendering with OpenGL and DirectX 9
Managing Enterprise Systems with the Windows Script Host
Introduction
Network Administration/WMI
Messaging Operations
Data Access
System Administration
C++ How to Program (5th Edition)
(Optional) Software Engineering Case Study: Examining the ATM Requirements Document
Separating Interface from Implementation
Multidimensional Arrays
Dynamic Memory Management with Operators new and delete
Exercises
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies