The word "virus" conjures up a scary image. Just as people don't want to be infected by a virus that might make them sick, they don't want their computers—and other electronic devices—infected by computer viruses. This must-read guide explains “electronic infections" and viruses, including Trojan horses and worms. Readers can arm themselves using the safety guidelines in the text to help combat and prevent the spread of these damaging computer programs.
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
For those who didn't buy the first edition, welcome aboard. For those who did buy the first edition, welcome back, and thanks for making the second edition possible. For those who bought the first edition and are standing in the book store wondering whether to buy the second, what's in it for you? Well, for one thing, it's smaller. (No, no! Don't leave!) I tried to make the first edition a kind of master reference for antiviral protection. That meant I included a lot of stuff that I thought might possibly be helpful, even if I had some doubts about it. This time I've tried to be a little more selective. I've added a little more material to Chapter 4 (Computer Opera tions and Viral Operations) dealing with the question of computer vi ruses infecting data files and the new "macro" viruses. I've added two new sections to Chapter 7 (The Virus and Society). One looks at the increasing problem of false alarms while the other looks at the ethics of virus writing and exchange.
In this treatment of how to defend against the onslaught of computer viruses that currently infect the IBM PC class of machines, Hruska explains how computer viruses are created, and how they spread. He discusses how malicious software such as Trojan Horses, Logic Bombs, or viruses work, and explains how they may even be used together. He offers practical advice on how to avoid situations that would result in the possible introduction of viruses into the computer systems, and provides a list of more than 40 organizations that provide commercial products to combat viruses. These products can be used to test computer systems to see whether they are infected, and to combat any infection. He also provides two programs in C language to detect viruses. ISBN 0-7458-0804-2; 32.95.
This book provides information on malware - its growth, evolution, and countermeasures to combat it - presenting new research into the economic incentives driving cyber-security decisions, and suggestions on how to address the problem.
The handbook is the result of extensive research and evaluation conducted by individual practioners, and commercial and government agencies in the United States, Europe and Canada. It has been researched and compiled to provide authoriative information about the virus threat, the technical issues involved, and countermeasures. The Computer Virus Handbook includes, for the first time in published form, independent technical evaluations of some 22 prominent anti-virus software packages - a survey which will prove invaluable to the computing professional seeking to identify, prevent or eliminate computer viruses. The handbook contains: * First-hand accounts of several notorious computer virus attacks - information unavailable in any other publication. * Company guidelines to reduce the risk of virus attacks with recommendations for computer virus disaster planning. * Technical research papers written by world authorities. * Definitions of computer virus and other attack programs. * Anatomical characteristics of specific viruses. * The first publication of a report about the emerging generation of computer viruses and the implications for establishing countermeasures.
This book opens with an overview of viruses and other types of rogue software. It then goes on to give an explanation of how the different types of known viruses operate, along with a look into the future of virus programs. The author then describes effective measures for preventing the spread of viruses, placing an emphasis on anti-virus policies that can be implemented in the workplace.
Designed for the busy executive. Provides a clear understanding of viruses and the detrimental effect they could have on an organization. Includes step-by-step methods to disinfect your computer.