
Résumé
With the growing number of computer virus infections today--and the billions of dollars spent on clean-up efforts--virus protection has become everybody's business. This detailed guide offers full-scale coverage and analysis of the origin, structure, and technology behind the expanding array of computer viruses, and addresses current methods of detection and prevention. By learning exactly how viruses do what they do, you'll better understand how anti-malware technology works--and be able to evaluate and implement practical solutions to protect your system. You'll get insight into the various types of malicious software--including Trojan horses, macro viruses, and worms--and also learn about virus hoaxes. Real-world case-studies provide you with a first-hand look at viruses in action and the damage they can cause. Thorough, insightful, and lucid, this up-to-date reference is essential reading for everyone--from network professionals and administrators involved in virus protection to the everyday computer user.
For more information, visit www.viruses-revealed.org.uk.This guide will help you:
- Get a historical overview of the emergence and evolution of computer viruses
- Learn about the anatomy of viruses--including worms and Trojans
- Examine different virus types and infection mechanisms--macro and script viruses, stealth viruses, and others
- Understand the specifics of virus activity and operation
- Identify good sources for virus information and risk assessment
- Implement corporate defensive strategies and systems
- Gain insight into social and legal aspects of data protection
- Discover how to practice safer computing
Part 1 - The Problem
Chapter 1. Baseline Definitions
Chapter 2. Historical Overview
Chapter 3. Malware Defined
Chapter 4. Virus Activity & Operation
Chapter 5. Virus Mechanisms
Part II - System Solutions
Chapter 6. Anti-Malware Technology Overview
Chapter 7. Malware Management
Chapter 8. Information Gathering
Chapter 9. Product Evaluation and Testing
Chapter 10. Incident Management
Chapter 11. User Management
Part III - Case Studies
Chapter 12. Case studies - the First Wave
Chapter 13. Case studies - the Second Wave
Chapter 14. Case Studies - Turning the Worm
Part IV - Social Aspects
Chapter 15. Virus Origin and Distribution
Chapter 16. Metaviruses and related nuisances
Chapter 17. Legal and Quasi-Legal Imperatives
Chapter 18. Responsibility
Chapter 19. Wrap-up chapter
Part V - Appendices
A) Virus L FAQ
B) Viruses & the Mac FAQ
C) Social Engineering FAQ
Glossary
Extraits du livre
L'auteur - David Harley
David Harley has a work history more chequered than most chessboards, embracing music, nursing, various aspects of the building trade, computing, and administration. He worked from1989 to 2001 at the Imperial Cancer Research Fund in London, originally as an administrator and programmer, then as a network engineer and support analyst, latterly as a security specialist. He now works for the United Kingdom's NHS Information Authority as Support Services Manager, where he still specializes in security, but is now allowed to express himself more pompously.
L'auteur - Robert Slade
Rob Slade is a data communications and security
specialist from North Vancouver, British Columbia,
Canada.
His research into computer viral programs began when they
first appeared as a major problem “in the
wild”. Acting initially as the unofficial archivist
for the budding research community, he has since become
known for “Mr. Slade's lists”. One of the
working group for the VIRUS-L FAQ, he has produced a series
of review and tutorial articles that have been published as
Robert Slade's Guide to Computer Viruses. He is the founder
of the DECUS Canada Security SIG. He still considers data
security to be a minor sideline, and was astounded to hear
himself referred to recently as a “leader” in
the security community.
L'auteur - Urs E. Gattiker
Urs Gattiker is Obel Family Foundation Professor of Innovation and Technology Management at the University of Aalborg. His previous positions include Stanford Center for Organization Research, Melbourne Business School, University of Lethbridge, University of the German Federal Armed Forces at Hamburg, and the Aarhus School of Business. He is a member of the supervisory board of KonNet GmbH (Germany), member of Bankinvest's Advisory Board for its BI Technology A/S' IT Venture Fund (http://www.BankInvest.dk). He also is a board member of various organizations including B2B Agro Scandinavia A/S, Naventi A/S, Vigilante Inc. (USA), and Vupti A/S.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Mc Graw Hill |
Auteur(s) | David Harley, Robert Slade, Urs E. Gattiker |
Parution | 12/10/2001 |
Nb. de pages | 682 |
Format | 18,6 x 23,2 |
Couverture | Broché |
Poids | 1420g |
Intérieur | Noir et Blanc |
EAN13 | 9780072130904 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse