Malicious Mobile Code
Virus Protection for Windows
By Roger A. Grimes
Publisher: O'Reilly Media
Released: August 2001
Pages: 544

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy.

The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book?

Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers:

  • The current state of the malicious code writing and cracker community
  • How malicious code works, what types there are, and what it can and cannot do
  • Common anti-virus defenses, including anti-virus software
  • How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it
  • Macro viruses affecting MS Word, MS Excel, and VBScript
  • Java applets and ActiveX controls
  • Enterprise-wide malicious code protection
  • Hoaxes
  • The future of malicious mobile code and how to combat such code

These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever. Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.

Table of Contents
Product Details
Colophon
Recommended for You
Customer Reviews

REVIEW SNAPSHOT®

by PowerReviews
O'Reilly MediaMalicious Mobile Code
 
4.0

(based on 4 reviews)

Ratings Distribution

  • 5 Stars

     

    (0)

  • 4 Stars

     

    (4)

  • 3 Stars

     

    (0)

  • 2 Stars

     

    (0)

  • 1 Stars

     

    (0)

Reviewed by 4 customers

Sort by

Displaying reviews 1-4

Back to top

(3 of 4 customers found this review helpful)

 
4.0

Malicious Mobile Code Review

By Kevin Steiner, Professor of Network Security, Capitol College.

from Undisclosed

Comments about O'Reilly Media Malicious Mobile Code:

If you need an indepth look at Malicious Code, this is THE book. This well-rounded, well thought-out reference should be in every Security Professional's Tool Kit. Almost everything is here in a "nutshell."

(3 of 3 customers found this review helpful)

 
4.0

Malicious Mobile Code Review

By Kevin Steiner, Professor of Network Security, Capitol College.

from Undisclosed

Comments about O'Reilly Media Malicious Mobile Code:

If you need an indepth look at Malicious Code, this is THE book. This well-rounded, well thought-out reference should be in every Security Professional's Tool Kit. Almost everything is here in a "nutshell."

(2 of 3 customers found this review helpful)

 
4.0

Malicious Mobile Code Review

By Kenneth Wilcox

from Undisclosed

Comments about O'Reilly Media Malicious Mobile Code:

Need protection for your insecure operating systems? This is your contraceptive! It looks like a technical book, it weighs as much as a technical book, it reads like a technical book. It must be a technical book. This is not a book you can sit down and read cover-to-cover, it has taken me several tries to read it. BUT it IS very informative I have yet to pick this book up without learning something. It is as scarry as the next Stephen King or Dean Koontz novel.

(0 of 1 customers found this review helpful)

 
4.0

Malicious Mobile Code Review

By Jason A. Powell, CISSP (Cincinnati, OH)

from Undisclosed

Comments about O'Reilly Media Malicious Mobile Code:

Malicious Mobile Code is very dry reading, but probably due more to the nature of the subject matter than any other factor. Although this book took almost twice as long to read in comparison to similarly voluminous O'Reilly books, it contained a wealth of knowlege, wisdom and common sense, even for this veteran security practitioner.

My only real gripe about this publication is the sheer volume of grammatical errors and typos; the second edition of this book should be much easier to read.

Overall, a very good book for IT professionals of all levels of experience, and it is written well enough to be of value for most savvy end-users, as well. It has earned a permanent place in my personal workplace library, and I expect that it will be referenced often.

Displaying reviews 1-4

Back to top

 
Buy 2 Get 1 Free Free Shipping Guarantee
Buying Options
Immediate Access - Go Digital what's this?
Print: $39.95