Rogue programs: viruses, worms, and Trojan horses
Experts in the field of "mischevious" programs are collected here in papers that cover all aspects of viruses--workings, protection, legal and ethical implications--all in nuts-and-bolts language designed to inform both technical and non-technical readers.
19 pages matching backups in this book
Results 1-3 of 19
What people are saying - Write a review
We haven't found any reviews in the usual places.
Overview of Rogue Programs
Virus Prevention in General
Social and Legal Issues and Effects
17 other sections not shown
activity alias antiviral applications attempt authentication backups behavior boot sector bytes cause CDEV command COMMAND.COM compiler computer crime computer networks computer professionals computer science Computer Security computer systems computer viruses contain copy criminal CVCM damage detect diskette effective electronic encrypted environment ethical executable fingerd floppy disk function hackers hard disk hardware host IBM PC infected program INIT installed intended Internet Worm interrupt legislation loaded machine mechanism memory modified monitoring NCSC nVIR operating system password personal computers policies potential prevent problem procedures Project Athena protection reported risk rogue programs sendmail sequence signature specific spread statute supra note system files tape target technical controls threats Trojan horse unauthorized UNIX update user's users vendor viral code viral infection virus virus attack virus programs viruses and related vulnerabilities