Coverart for item
The Resource Malicious mobile code : virus protection for Windows, Roger A. Grimes

Malicious mobile code : virus protection for Windows, Roger A. Grimes

Label
Malicious mobile code : virus protection for Windows
Title
Malicious mobile code
Title remainder
virus protection for Windows
Statement of responsibility
Roger A. Grimes
Creator
Subject
Language
eng
Action
digitized
Cataloging source
OCL
http://library.link/vocab/creatorName
Grimes, Roger A
Dewey number
005.8/4
Illustrations
illustrations
Index
index present
LC call number
QA76.76.C68
LC item number
G75 2001eb
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/subjectName
  • Computer viruses
  • Computer security
  • COMPUTERS
  • Computer security
  • Computer viruses
  • Computervirussen
  • Computerbeveiliging
  • Virus informatiques
Label
Malicious mobile code : virus protection for Windows, Roger A. Grimes
Instantiates
Publication
Note
Includes index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • MMC Terminology
  • 221
  • 7.
  • Instant Messaging Attacks
  • 226
  • Introduction to Instant Messaging
  • 226
  • Types of Instant Messaging
  • 228
  • Introduction to Internet Relay Chat
  • 230
  • 20
  • Hacking Instant Messaging
  • 235
  • Examples of IRC Attacks
  • 242
  • Detecting Malicious IM
  • 246
  • Removing Malicious IM
  • 247
  • Protecting Yourself from IM Attacks
  • 248
  • 2.
  • 8.
  • Internet Browser Technologies
  • 251
  • Browser Technologies
  • 253
  • Web Languages
  • 259
  • Other Browser Technologies
  • 266
  • When to Worry About Browser Content
  • DOS Computer Viruses
  • 274
  • 9.
  • Internet Browser Attacks
  • 276
  • Browser-Based Exploits
  • 276
  • Examples of Attacks and Exploits
  • 277
  • Detecting Internet Browser Attacks
  • 293
  • 22
  • Removing and Repairing the Damage
  • 295
  • Preventing Internet Browser Attacks
  • 295
  • 10.
  • Malicious Java Applets
  • 306
  • Java
  • 306
  • Java Security
  • DOS Technologies
  • 311
  • Java Exploits
  • 319
  • Example Java Exploits
  • 322
  • Detecting Malicious Java Applets
  • 328
  • Removing Malicious Java Code
  • 331
  • Protecting Yourself from Malicious Java Code
  • 23
  • 332
  • 11.
  • Malicious ActiveX Controls
  • 341
  • ActiveX
  • 341
  • ActiveX Security
  • 346
  • ActiveX Security Criticisms
  • 362
  • DOS Virus Technologies
  • Malicious ActiveX Examples
  • 365
  • Detecting Malicious ActiveX Controls
  • 370
  • Removing and Preventing Malicious Active Controls
  • 371
  • 12.
  • Email Attacks
  • 383
  • Email Programs
  • 32
  • 384
  • Email Exploits
  • 394
  • Detecting Email Attacks
  • 398
  • Removing Infected Email
  • 399
  • Preventing Email Attacks
  • 403
  • 13.
  • Types of DOS Viruses
  • Hoax Viruses
  • 418
  • Mother of All Computer Viruses
  • 418
  • Categories of Hoax Messages
  • 422
  • Detection
  • 427
  • Removing and Preventing Hoax Viruses
  • 432
  • Hunt
  • 33
  • 14.
  • Defense
  • 435
  • Defense Strategy
  • 435
  • Malicious Mobile Code Defense Plan
  • 436
  • Use a Good Antivirus Scanner
  • 447
  • Antivirus Scanning Locations
  • Virus Defense Mechanisms
  • 455
  • Best Steps Toward Securing Any Windows PC
  • 461
  • Additional Defense Tools
  • 464
  • Antivirus Product Review
  • 471
  • Future
  • 475
  • 15.
  • 43
  • Future
  • 477
  • Future of Computing
  • 477
  • MMC Exploits
  • 483
  • Real Defense Solutions
  • 486
  • Examples of DOS Viruses
  • 48
  • Detecting a DOS-Based Computer Virus
  • 50
  • Removing a DOS Virus
  • 53
  • Protecting Yourself from Viruses
  • 1
  • 55
  • 3.
  • Windows Technologies
  • 59
  • Windows Technologies
  • 59
  • New Windows Versions
  • 86
  • 4.
  • Viruses in a Windows World
  • What Is Malicious Mobile Code?
  • 93
  • DOS Viruses on Windows Platforms
  • 93
  • Windows Viruses on Windows Platforms
  • 99
  • Signs and Symptoms of Windows NT Virus Infections
  • 102
  • Windows Virus Examples
  • 105
  • Detecting a Windows Virus
  • 2
  • 111
  • Removing Viruses
  • 118
  • Removing Infected Files
  • 121
  • Preventing Viruses in Windows
  • 125
  • Future
  • 128
  • 5.
  • Malicious Code and the Law
  • Macro Viruses
  • 130
  • What Is a Macro Virus?
  • 131
  • Microsoft Word and Excel Macros
  • 135
  • Working with Macros
  • 138
  • Office 2000 Security
  • 143
  • 11
  • Macro Virus Technologies
  • 147
  • Macro Virus Examples
  • 157
  • Detecting Macro Viruses
  • 160
  • Removing Macro Viruses and Repairing the Damage
  • 166
  • Preventing Macro Viruses
  • 173
  • Malicious Code-Writing Subculture
  • 6.
  • Trojans and Worms
  • 180
  • Threat
  • 180
  • What Are Trojan Horses and Worms?
  • 182
  • Signs and Symptoms
  • 184
  • Types of Trojans
  • 13
  • 184
  • Trojan Technology
  • 191
  • Becoming Familiar with Your PC
  • 194
  • Trojan and Worm Examples
  • 199
  • Detecting and Removing Trojans and Worms
  • 208
  • Preventing Trojans and Worms
Control code
54116306
Dimensions
unknown
Edition
1st ed.
Extent
1 online resource (xviii, 522 pages)
Form of item
online
Isbn
9781491994702
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
  • 1012940
  • fd69b4cd-f384-4732-95e6-d899e5dd6c78
Reproduction note
Electronic reproduction.
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)54116306
System details
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Label
Malicious mobile code : virus protection for Windows, Roger A. Grimes
Publication
Note
Includes index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • MMC Terminology
  • 221
  • 7.
  • Instant Messaging Attacks
  • 226
  • Introduction to Instant Messaging
  • 226
  • Types of Instant Messaging
  • 228
  • Introduction to Internet Relay Chat
  • 230
  • 20
  • Hacking Instant Messaging
  • 235
  • Examples of IRC Attacks
  • 242
  • Detecting Malicious IM
  • 246
  • Removing Malicious IM
  • 247
  • Protecting Yourself from IM Attacks
  • 248
  • 2.
  • 8.
  • Internet Browser Technologies
  • 251
  • Browser Technologies
  • 253
  • Web Languages
  • 259
  • Other Browser Technologies
  • 266
  • When to Worry About Browser Content
  • DOS Computer Viruses
  • 274
  • 9.
  • Internet Browser Attacks
  • 276
  • Browser-Based Exploits
  • 276
  • Examples of Attacks and Exploits
  • 277
  • Detecting Internet Browser Attacks
  • 293
  • 22
  • Removing and Repairing the Damage
  • 295
  • Preventing Internet Browser Attacks
  • 295
  • 10.
  • Malicious Java Applets
  • 306
  • Java
  • 306
  • Java Security
  • DOS Technologies
  • 311
  • Java Exploits
  • 319
  • Example Java Exploits
  • 322
  • Detecting Malicious Java Applets
  • 328
  • Removing Malicious Java Code
  • 331
  • Protecting Yourself from Malicious Java Code
  • 23
  • 332
  • 11.
  • Malicious ActiveX Controls
  • 341
  • ActiveX
  • 341
  • ActiveX Security
  • 346
  • ActiveX Security Criticisms
  • 362
  • DOS Virus Technologies
  • Malicious ActiveX Examples
  • 365
  • Detecting Malicious ActiveX Controls
  • 370
  • Removing and Preventing Malicious Active Controls
  • 371
  • 12.
  • Email Attacks
  • 383
  • Email Programs
  • 32
  • 384
  • Email Exploits
  • 394
  • Detecting Email Attacks
  • 398
  • Removing Infected Email
  • 399
  • Preventing Email Attacks
  • 403
  • 13.
  • Types of DOS Viruses
  • Hoax Viruses
  • 418
  • Mother of All Computer Viruses
  • 418
  • Categories of Hoax Messages
  • 422
  • Detection
  • 427
  • Removing and Preventing Hoax Viruses
  • 432
  • Hunt
  • 33
  • 14.
  • Defense
  • 435
  • Defense Strategy
  • 435
  • Malicious Mobile Code Defense Plan
  • 436
  • Use a Good Antivirus Scanner
  • 447
  • Antivirus Scanning Locations
  • Virus Defense Mechanisms
  • 455
  • Best Steps Toward Securing Any Windows PC
  • 461
  • Additional Defense Tools
  • 464
  • Antivirus Product Review
  • 471
  • Future
  • 475
  • 15.
  • 43
  • Future
  • 477
  • Future of Computing
  • 477
  • MMC Exploits
  • 483
  • Real Defense Solutions
  • 486
  • Examples of DOS Viruses
  • 48
  • Detecting a DOS-Based Computer Virus
  • 50
  • Removing a DOS Virus
  • 53
  • Protecting Yourself from Viruses
  • 1
  • 55
  • 3.
  • Windows Technologies
  • 59
  • Windows Technologies
  • 59
  • New Windows Versions
  • 86
  • 4.
  • Viruses in a Windows World
  • What Is Malicious Mobile Code?
  • 93
  • DOS Viruses on Windows Platforms
  • 93
  • Windows Viruses on Windows Platforms
  • 99
  • Signs and Symptoms of Windows NT Virus Infections
  • 102
  • Windows Virus Examples
  • 105
  • Detecting a Windows Virus
  • 2
  • 111
  • Removing Viruses
  • 118
  • Removing Infected Files
  • 121
  • Preventing Viruses in Windows
  • 125
  • Future
  • 128
  • 5.
  • Malicious Code and the Law
  • Macro Viruses
  • 130
  • What Is a Macro Virus?
  • 131
  • Microsoft Word and Excel Macros
  • 135
  • Working with Macros
  • 138
  • Office 2000 Security
  • 143
  • 11
  • Macro Virus Technologies
  • 147
  • Macro Virus Examples
  • 157
  • Detecting Macro Viruses
  • 160
  • Removing Macro Viruses and Repairing the Damage
  • 166
  • Preventing Macro Viruses
  • 173
  • Malicious Code-Writing Subculture
  • 6.
  • Trojans and Worms
  • 180
  • Threat
  • 180
  • What Are Trojan Horses and Worms?
  • 182
  • Signs and Symptoms
  • 184
  • Types of Trojans
  • 13
  • 184
  • Trojan Technology
  • 191
  • Becoming Familiar with Your PC
  • 194
  • Trojan and Worm Examples
  • 199
  • Detecting and Removing Trojans and Worms
  • 208
  • Preventing Trojans and Worms
Control code
54116306
Dimensions
unknown
Edition
1st ed.
Extent
1 online resource (xviii, 522 pages)
Form of item
online
Isbn
9781491994702
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
  • 1012940
  • fd69b4cd-f384-4732-95e6-d899e5dd6c78
Reproduction note
Electronic reproduction.
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)54116306
System details
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...