Malicious Mobile Code-(EBOOK) virus protection for Windows / Roger A. Grimes
Publisher: Sebastopol, Calif. : O'Reilly, 2001Edition: 1. edDescription: xviii, 522 s. : illISBN: 1-56592-682-X (hft.)Subject(s): EBOOKDDC classification: 005.84
Contents:
Chapter 1. Introduction- Chapter 2. DOS Computer Viruses- Chapter 3. Windows Technologies- Chapter 4. Viruses in a Windows World- Chapter 5. Macro Viruses- Chapter 6. Trojans and Worms- Chapter 7. Instant Messaging Attacks- Chapter 8. Internet Browser Technologies- Chapter 9. Internet Browser Attacks- Chapter 10. Malicious Java Applets- Chapter 11. Malicious ActiveX Controls- Chapter 12. Email Attacks- Chapter 13. Hoax Viruses- Chapter 14. Defense- Chapter 15. The Future
| Item type | Current location | Home library | Collection | Call number | URL | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|---|
Book
|
Military College of Signals (MCS) | Military College of Signals (MCS) | NFIC | 005.84 GRI (Browse shelf) | Link to resource | Available | MCSEB-555 |
Total holds: 0
Browsing Military College of Signals (MCS) shelves Close shelf browser
| No cover image available | ||||||||
| 005.82 SCH Applied cryptography -(E-BOOK) | 005.82 VIE Secure programming cookbook(E-BOOK) | 005.822 PAN Hacking | 005.84 GRI Malicious Mobile Code-(EBOOK) | 005.84 SIK Practical malware analysis: the hands-on guide to dissecting malicious software (EBOOK) | 0050 BUT Qasid 1981 | 0051.33 BUR Beginning programming with Java for dummies(E-BOOK) |
Chapter 1. Introduction- Chapter 2. DOS Computer Viruses- Chapter 3. Windows Technologies- Chapter 4. Viruses in a Windows World- Chapter 5. Macro Viruses- Chapter 6. Trojans and Worms- Chapter 7. Instant Messaging Attacks- Chapter 8. Internet Browser Technologies- Chapter 9. Internet Browser Attacks- Chapter 10. Malicious Java Applets- Chapter 11. Malicious ActiveX Controls- Chapter 12. Email Attacks- Chapter 13. Hoax Viruses- Chapter 14. Defense- Chapter 15. The Future

Book
There are no comments on this title.