Skip to content
Scan a barcode
Scan
Paperback Malicious Mobile Code: Virus Protection for Windows Book

ISBN: 156592682X

ISBN13: 9781565926820

Malicious Mobile Code: Virus Protection for Windows

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Good

$5.89
Save $39.10!
List Price $44.99
Almost Gone, Only 1 Left!

Book Overview

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today,...

Customer Reviews

5 ratings

A student's perspective

More important than anything else I can say about this book is that it was a good read! Being subject to often boring books on algorithms, and operating systems, this book kept me captivated with its straight forward presentation, and even more remarkable stories. Even if you never plan to start editting a registry, this book is worth reading.What I got most from this book though was a perpective on dealing with virus (etc) problems overall. Identifying what area of a system needs examining, what precautions should be taken, and even classifying symptoms, was very enlightning. That it was also a major source in a paper I received an A on, doesn't hurt either. I am sure it will come in as a handy reference for some time yet.

A great security overview

Keeping up with computer security is a full time job. Grimes has given a clear, precise primer of one aspect of computer security - viruses, trojans, worms - collectively known as malicious mobile code. The book is DOS/Windows centric, but this focus helps you see a) where the threats for the most part, and b) allows you to extend the types of threats into other operating systems. You are taken step by step through the development of malicious code and how and why they can work on some systems, but less effectively on others. The constant refrain of the book shows the author's philosophy: Use an up to date anti-virus product. But if somethign slips by, Grimes shows you ways to react, and lessen the impact if not to this once computer, but to the rest on the network. It is easily one of the most readable books I have encountered on the subject.This book is an essential reference for any computer manager's toolkit. We can't stop the code writers from producing thier output, but we can work to lessen the impact they can have on us.

Well written book!

I confess to some bias - I was one of the tech reviewers on this book. I work with network security all of the time, but one area I'm not an expert on is viruses. Reviewing Roger's book was a real education - I learned quite a bit. I also known from experience that writing about technical subjects can be difficult and dry - this book was an easy read all the way through. If you're interested in learning more about viruses, this is a must-have.

Highly Informative Look at Viruses, Worms, etc

This book offers one of the best and most complete look at viruses, worms, Trojans, and any other type of program designed to "infect" a computer. It describes not only the various types of "malicious programs" out there, but also the environments in which they run. The book's second chapter discusses DOS based viruses, and even if DOS is not that popular anymore, it is good for a historical reference. The book goes on to discuss Windows-related viruses, macro viruses, as well as Trojans and worms. Each chapter gives examples of what to look for if you suspect you have been infected, and the early chapters give summaries of "famous viruses of the past." Also discussed are attacks involving IRC and other instant messaging programs, browser technologies, malicious Java applets, and what types of attacks can occur with Active X. There's also a chapter devoted to email attacks.The book finishes off with chapters on hoax viruses, which can be just as dangerous sometimes as real viruses, when people assume the hoaxes are true, how to defend against malicious code, and finally what the future entails.Malicious code unfortunately is a way of life and this book offers lots of information on how to avoid them and also what to do if your computer does get infected.

A must for anyone in the computer field

I've been in the computer consulting field for over 10 years (DOS, Novell, and Microsoft), and during all that time I've been fighting viruses, and now emailing worms, for my clients. I've always installed the latest antivirus software and told my clients how to treat suspicious emails or files. And while this advice has always worked on my company's network, it seems rarely to have worked at my customer's locations. Mr. Grimes talks about the same experiences in the book. (I was passed an early copy of the book by one of my friends in the antivirus industry). To make a long story short, the book's advice works. It's all commonsense stuff after you read it, and it showed me some new prevention tactics that I will continue to use with existing and future clients.As for example, one of my clients, with about 100 workstations, seemed to get infected about every three days no matter what I would tell them (one person in particular). And although I love the consulting dollars, it really became a pain disinfecting their network again and again. I followed the steps in the book, and my clients haven't been infected since. It's only been a month, but they went from dozens of infections per week, to none.Every chapter in the book covers a particular topic, like Windows viruses, Instant Messaging attacks, Email attacks, etc. Mr. Grimes begins by describing the underlying technology, talks about specific attacks, and then tells how to detect and prevent them. Each chapter has dozens of recommendations and his last chapter (actually second to last) talks about what steps you should take on each PC you supervise. This was nice because trying to remember the dozens of steps to take all at once would have been tough. He even covers how to make an anti-virus plan, but that doesn't really apply to my consulting work; however I'm sure it would help a company system admin type.I can easily say I learned more about Virus attacks on Windows, Java, VBA, and Internet apps than I knew before. I was really surprised by how many places bad programs can hide to automatically start on a computer. There are over a dozen. And for a technical book it was really easy reading. It was the best book I've ever read, and used, on computer viruses. The book included his email address and I sent a question to him and he answered it the same day. The book covers Windows, no Linux or Mac, but doesn't cover Novell Groupwise in the email chapter but it is well worth the read. Although most of my clients are Microsoft shops, I've still have some Novell shops. It mentions, but doesn't discuss automated distribution tools, like SMS or ZenWorks. If you've got a very large network, you're going to need a good way to automate all the steps. There are few typos and grammar errors, but certainly not enough to take away from the message. Also, like most other antivirus books, it doesn't say what antivirus product to get. Mr. Grimes mentions a few different products, but I was
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured