Computer viruses and anti-virus warfare
Including much new and valuable material, this second revised edition presents a step-by-step method for effectively dealing with virus attacks. The book analyzes virus structure by looking at infection paths and common carriers. Covers stealth viruses in detail, explores side effects and mutations and offers practical suggestions for preventing virus infection.
Try this search over all volumes: 4711
Results 1-0 of 0
What people are saying - Write a review
We haven't found any reviews in the usual places.
PREFACE AND ACKNOWLEDGEMENTS
HOW CAN A VIRUS PENETRATE
11 other sections not shown
Other editions - View all
algorithm ANSI.SYS anti-virus software assembly language Awaiting analysis become infected boot sector viruses bulletin boards byte mutation byte virus bytes long Cascade checksumming command COMMAND.COM Computer Viruses CONFIG.SYS contains the text copy cryptographic Dark Avenger Datacrime DEBUG delete detected diskless workstations displays the message drive encrypted virus example file server fingerprints floppy disk fully analysed hard disk hardware infect EXE files infected disk infected files infected program Infective length instructions interrupt Jerusalem virus logic bomb master boot sector memory memory-resident minor mutation MS-DOS multi-partite viruses NetWare operating system organisation original boot sector overwriting virus parasitic viruses pattern is possible payload register int replicate root directory scanner search pattern static int stored string Suriv triggered Trojan horse unsigned char virus activates virus attack Virus Bulletin virus code virus contains virus infection virus-specific workstation worm write-protected written