More important than anything else I can say about this book is that it was a good read! Being subject to often boring books on algorithms, and operating systems, this book kept me captivated with its straight forward presentation, and even more remarkable stories. Even if you never plan to start editting a registry, this book is worth reading.What I got most from this book though was a perpective on dealing with virus (etc)...
0Report
Keeping up with computer security is a full time job. Grimes has given a clear, precise primer of one aspect of computer security - viruses, trojans, worms - collectively known as malicious mobile code. The book is DOS/Windows centric, but this focus helps you see a) where the threats for the most part, and b) allows you to extend the types of threats into other operating systems. You are taken step by step through the development...
0Report
I confess to some bias - I was one of the tech reviewers on this book. I work with network security all of the time, but one area I'm not an expert on is viruses. Reviewing Roger's book was a real education - I learned quite a bit. I also known from experience that writing about technical subjects can be difficult and dry - this book was an easy read all the way through. If you're interested in learning more about viruses,...
0Report
This book offers one of the best and most complete look at viruses, worms, Trojans, and any other type of program designed to "infect" a computer. It describes not only the various types of "malicious programs" out there, but also the environments in which they run. The book's second chapter discusses DOS based viruses, and even if DOS is not that popular anymore, it is good for a historical reference. The book goes on to...
0Report
I've been in the computer consulting field for over 10 years (DOS, Novell, and Microsoft), and during all that time I've been fighting viruses, and now emailing worms, for my clients. I've always installed the latest antivirus software and told my clients how to treat suspicious emails or files. And while this advice has always worked on my company's network, it seems rarely to have worked at my customer's locations. Mr...
0Report