Viruses Revealed 1st edition by David Harley, Urs E. Gattiker, Eugene H. Spafford – Ebook PDF Instant Download/Delivery. 0072228180, 978-0072228182
Full download Viruses Revealed 1st Edition after payment
Product details:
ISBN 10: 0072228180
ISBN 13: 978-0072228182
Author: David Harley, Urs E. Gattiker, Eugene H. Spafford
Viruses Revealed is a practical guide to defending your system against the real threat of computer viruses.
This book presents a soup-to-nuts, full-bodied analysis on computer virus protection by offering:
— Current information on the expanding domain of computer viruses.
— Real world case studies of virus infestations, solutions, and methods of prevention.
— Practical problem and solution analysis of the modern day virus threat.
Viruses Revealed 1st Table of contents:
PART I: The Problem
CHAPTER 1: Baseline Definitions
- Computer Virus Fact and Fantasy
- Definitions
- Instant Guide to Anti-Virus Software
- Summary
CHAPTER 2: Historical Overview
- Virus Prehistory: Jurassic Park to Xerox PARC
- Real Viruses: Early Days
- The Internet Age
- And So It Goes…
- Summary
CHAPTER 3: Malware Defined
- What Computers Do
- Virus Functionality
- In-the-Wild Versus Absolute Big Numbers
- What Do Anti-Virus Programs Actually Detect?
- Summary
CHAPTER 4: Virus Activity and Operation
- How Do You Write a Virus?
- Tripartite Structure
- Replication
- Generality, Extent, Persistence
- Payload Versus Reproduction
- Damage
- Ban the Bomb
- Summary
CHAPTER 5: Virus Mechanisms
- Hardware-Specific Viruses
- The Boot Zone
- File Infectors
- Multipartite Viruses
- Interpreted Viruses
- Concealment Mechanisms
- Summary
PART II: System Solutions
CHAPTER 6: Anti-Malware Technology Overview
- Great Expectations
- How Do We Deal with Viruses and Related Threats?
- Summary
CHAPTER 7: Malware Management
- Defining Malware Management
- Cost of Ownership Versus Administration Costs
- Summary
CHAPTER 8: Information Gathering
- How Can I Check Whether Advice Is Genuine or Useful?
- Books
- Articles and Papers
- Online Resources
CHAPTER 9: Product Evaluation and Testing
- Core Issues
- Test Match
- Further Information
- Summary
CHAPTER 10: Risk and Incident Management
- Risk Management
- The Best Form of Defence Is Preparation
- Reported Virus Incidents
- Summary
CHAPTER 11: User Management
- Managing the Managers
- Risk/Impact Analysis
- Management Costs
- Policy Issues
- Help Desk Support
- Other IT Support Staff
- IT Security and Other Units
- Training and Education
- Positive Reinforcement
- Proactive Malware Management
- Safe Hex Guidelines
- Hoax Management
- Summary
PART III: Case Studies: What Went Wrong, What Went Right, What Can We Learn?
CHAPTER 12: Case Studies: The First Wave
- Brainwashing
- The MacMag Virus
- Scores
- Lehigh
- CHRISTMA EXEC
- The Morris Worm (Internet Worm)
- The WANK Worm
- Jerusalem
- The “AIDS” Trojan
- Everybody Must Get Stoned
- Form
- The Modem Virus Hoax
- The Iraqi Printer Virus
- Summary
CHAPTER 13: Case Studies: The Second Wave
- The Black Baron
- Good Times Just Around the Corner
- Proof of Concept
- The Empire Strikes Back—Slowly
- WM/Nuclear
- Colors
- DMV
- Wiederoffnen and FormatC
- Diddling: Green Stripe and Wazzu
- WM/Atom
- WM/Cap
- Excel Viruses
- Variations on a Theme
- Word 97
- Thank You for Sharing
- Macro Virus Nomenclature
- Anti-Macro Techniques
- Hare
- Chernobyl (CIH.Spacefiller)
- Esperanto
- Summary
CHAPTER 14: Case Studies: Turning the Worm (the Third Wave)
- The AutoStart Worm
- W97M/Melissa (Mailissa)
- W32/Happy99 (Ska), the Value-Added Virus
- PrettyPark
- Keeping to the Script
- VBS/Freelink
- I Wrote a Letter to My Love—VBS/LoveLetter
- VBS/NewLove-A
- Call 911!
- VBS/Stages
- BubbleBoy and KAKworm
- MTX (Matrix, Apology)
- Naked Wife
- W32/Navidad
- W32/Hybris
- VBS/VBSWG.J@mm (Anna Kournikova)
- VBS/Staple.a@mm
- Linux Worms
- Lindose (Winux)
- W32/Magistr@mm
- BadTrans
- Summary
PART IV: Social Aspects
CHAPTER 15: Virus Origin and Distribution
- Who Writes This Stuff?
- Social Engineering
- Social Engineering Definitions
- Why Do They Write This Stuff?
- Secondary Distribution
- Does Education Work?
- Global Education
- Summary
CHAPTER 16: Metaviruses, Hoaxes, and Related Nuisances
- Chain Letters
- Hoaxes
- Urban Legends
- Chain Letters and Hoaxes
- Hoaxes and Virus Alerts
- Misinformation under the Microscope
- Spam, Spam, Spam (Part 2)
- Spamology and Virology
- Metaviruses and User Management
- Summary
CHAPTER 17: Legal and Quasilegal Imperatives
- Malware and the Law
- Grounds for Criminal Proceedings
- The Computer Misuse Act
- Some Broad Concepts
- Data Protection Legislation
- Data Protection Principles
- BS7799 and Virus Controls
- ISO 9000
- Security Architecture
- Policy Outlines
- Summary
CHAPTER 18: Responsibility, Morality, and Ethics
- The Two-Minute Guide to Ethics
- Demographics
- Cultural and National Norms
- Familiarity and Ethics
- End Users and Responsibility
- Is Anti-Virus a Profession?
- Vendors and Ethics
- Commercial Ethics
- Do No Harm
- Developing Codes of Conduct
- EICAR
- Do Codes of Conduct Make a Difference?
- Summary
CHAPTER 19: Wrap Up
- Predictions
- Closing Comments
- Stop Press
- Summary
PART V: Appendixes
APPENDIX A: Frequently Asked Questions on VIRUS-L/comp.virus
- Primary Contributors
APPENDIX B: Viruses and the Macintosh
- How Many Viruses Affect the Macintosh?
- Mac-Specific Viruses
- PC Viruses on Emulated PCs
- Esperanto.4733
- PC Scripting Viruses
- The EICAR Installation Test File
- Information Resources
- Mac Troubleshooting
- Questions Received at Mac Virus
APPENDIX C: Social Engineering
- IT Security
- What the Intruder Wants to Know
- People Hacking
- Targeting the Help Desk
- Attacks on the Help Desk
- Do I Need to Disclose My Password?
- Wouldn’t I Notice Unwarranted Interest in Security Issues?
- How Big Is the Risk?
- What Are the Solutions?
- Good Password Practice
- Why Do Password Practices Matter?
- Where Do I Get Further Information?
People also search for Viruses Revealed 1st :
viruses rare
viruses reverse transcriptase
how viruses make you ill
dna viruses replication
evidence viruses are alive