Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers:
"synopsis" may belong to another edition of this title.
Defending Microsoft Windows against viruses requires careful attention to emerging technical alerts and diligence in installing manufacturers' latest patches and upgrades. You'll do a better job of keeping Windows secure if you have a body of background knowledge about security weaknesses in Windows and familiarity with good security practices. That, for the most part, is what Malicious Mobile Code is about. Roger Grimes shares facts, tells stories, and reveals technical details that will make you realize how serious a threat is posed by malicious mobile code (a catch-all term Grimes uses to describe viruses, Trojans, and the like). Further, his exposition will likely motivate you to take the precautions he recommends.
Some of Grimes's advice is by now obvious (don't run executable files that arrive attached to e-mail messages), but a lot of it will be news to Windows users and even system administrators. For example, he goes into considerable detail on how BackOrifice works, with particular attention to how black-hat hackers use it to build networks of compromised machines that they can use in further attacks. He's liberal with defensive advice, as well, describing how to adjust the settings of your browser, instant messaging client, and other software to stave off attacks. There's much discussion of Registry manipulation, too. More coverage of risks specific to Windows 2000 (and Windows XP, which isn't covered here at all) would make this book better, but since many attacks are generic to 32-bit Windows environments, Grimes's work remains current. --David Wall
Topics covered: Viruses, Trojans, worms, and other nasties--particularly those that can be distributed with e-mail messages, Web pages, or instant messaging tools--that can disable Microsoft Windows, or turn control of it over to unauthorized hackers. Coverage is explanatory, in a "know your enemy" sort of way, and includes lots of defensive strategies.
Roger A. Grimes (CPA, CISSP, CEH, MCSE: Security) is a 19-year Windows security veteran with 6 books and over 150 national magazine articles on the subject. Roger is a 3-time Microsoft MVP in Windows Security (and MVP of the Month in December 2005). He participated in the Microsoft Windows Server 2003 Learning curriculum and was an Early Achiever of theWindows Server 2003 MSCE: Security desination. Roger has written advanced Windows security courses for Microsoft, Foundstone, and SANS.
"About this title" may belong to another edition of this title.
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 1st Edition. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Seller Inventory # 5281309-6
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G156592682XI3N00
Seller: HPB-Emerald, Dallas, TX, U.S.A.
paperback. Condition: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_454096030
Seller: Ammareal, Morangis, France
Softcover. Condition: Bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2001. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Slight signs of wear on the cover. Edition 2001. Ammareal gives back up to 15% of this item's net price to charity organizations. Seller Inventory # D-632-388
Quantity: 1 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 529488-n
Seller: Lakeside Books, Benton Harbor, MI, U.S.A.
Condition: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books! Seller Inventory # OTF-S-9781565926820
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Malicious Mobile Code: Virus Protection for Windows. Book. Seller Inventory # BBS-9781565926820
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9781565926820
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 529488
Seller: Rarewaves USA, OSWEGO, IL, U.S.A.
Paperback. Condition: New. Malicious mobile code is a new term to describe all sorts of bad programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug have proved the experts wrong, attacking Windows computers when recipients do nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code that will do destructive things. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. There are effective ways to thwart Windows malicious code attacks, and Roger Grimes maps them out in this book. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a rundown on today's viruses and how to protect a system from them. He looks at ways to configure Windows for maximum protection, what a DOS virus can and cannot do, what today's biggest threats are and other important information.The book offers the strategies, tips, and tricks to secure a system against attack. It covers: the current state of the malicious code writing and cracker community in 2001; how malicious code works, what types there are, and what it can and cannot do; common anti-virus defenses, including anti-virus software; how malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent them; macro viruses affecting MS Word, MS Excel, and VBScript; Java applets and ActiveX controls; enterprise-wide malicious code protection; hoaxes; and the future of computer malicious mobile code and how to combat it. Seller Inventory # LU-9781565926820