Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers:
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Roger A. Grimes is the principal of a firm specializing in client/server networking technologies, and he has been providing professional anti-virus consulting services for nine years. His clients have included some of the nation's largest banks, universities, and the U.S. Navy. He has also written dozens of magazine and newspaper articles on technical subjects.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : Better World Books, Mishawaka, IN, Etats-Unis
Etat : Good. 1st Edition. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. N° de réf. du vendeur 5281309-6
Quantité disponible : 2 disponible(s)
Vendeur : ThriftBooks-Atlanta, AUSTELL, GA, Etats-Unis
Paperback. Etat : Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. N° de réf. du vendeur G156592682XI3N00
Quantité disponible : 1 disponible(s)
Vendeur : HPB-Emerald, Dallas, TX, Etats-Unis
paperback. Etat : Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority! N° de réf. du vendeur S_454096030
Quantité disponible : 1 disponible(s)
Vendeur : Ammareal, Morangis, France
Softcover. Etat : Bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2001. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Slight signs of wear on the cover. Edition 2001. Ammareal gives back up to 15% of this item's net price to charity organizations. N° de réf. du vendeur D-632-388
Quantité disponible : 1 disponible(s)
Vendeur : Lakeside Books, Benton Harbor, MI, Etats-Unis
Etat : New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books! N° de réf. du vendeur OTF-S-9781565926820
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 529488-n
Quantité disponible : 1 disponible(s)
Vendeur : BargainBookStores, Grand Rapids, MI, Etats-Unis
Paperback or Softback. Etat : New. Malicious Mobile Code: Virus Protection for Windows. Book. N° de réf. du vendeur BBS-9781565926820
Quantité disponible : 5 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 529488
Quantité disponible : 1 disponible(s)
Vendeur : Rarewaves USA, OSWEGO, IL, Etats-Unis
Paperback. Etat : New. Malicious mobile code is a new term to describe all sorts of bad programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug have proved the experts wrong, attacking Windows computers when recipients do nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code that will do destructive things. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. There are effective ways to thwart Windows malicious code attacks, and Roger Grimes maps them out in this book. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a rundown on today's viruses and how to protect a system from them. He looks at ways to configure Windows for maximum protection, what a DOS virus can and cannot do, what today's biggest threats are and other important information.The book offers the strategies, tips, and tricks to secure a system against attack. It covers: the current state of the malicious code writing and cracker community in 2001; how malicious code works, what types there are, and what it can and cannot do; common anti-virus defenses, including anti-virus software; how malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent them; macro viruses affecting MS Word, MS Excel, and VBScript; Java applets and ActiveX controls; enterprise-wide malicious code protection; hoaxes; and the future of computer malicious mobile code and how to combat it. N° de réf. du vendeur LU-9781565926820
Quantité disponible : Plus de 20 disponibles
Vendeur : Rarewaves.com USA, London, LONDO, Royaume-Uni
Paperback. Etat : New. Malicious mobile code is a new term to describe all sorts of bad programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug have proved the experts wrong, attacking Windows computers when recipients do nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code that will do destructive things. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. There are effective ways to thwart Windows malicious code attacks, and Roger Grimes maps them out in this book. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a rundown on today's viruses and how to protect a system from them. He looks at ways to configure Windows for maximum protection, what a DOS virus can and cannot do, what today's biggest threats are and other important information.The book offers the strategies, tips, and tricks to secure a system against attack. It covers: the current state of the malicious code writing and cracker community in 2001; how malicious code works, what types there are, and what it can and cannot do; common anti-virus defenses, including anti-virus software; how malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent them; macro viruses affecting MS Word, MS Excel, and VBScript; Java applets and ActiveX controls; enterprise-wide malicious code protection; hoaxes; and the future of computer malicious mobile code and how to combat it. N° de réf. du vendeur LU-9781565926820
Quantité disponible : Plus de 20 disponibles