Publisher: O'Reilly | ISBN: 156592682X | CHM | 2,83 MB | 542 Pages | 2001 Year
This book covers malicious mobile code attacks on Windows PCs, including: computer viruses, macro viruses, Trojan horse programs, worms, email exploits, Java TM and ActiveX TM exploits, instant messaging attacks, and Internet browser exploits.
This book is written for intermediate and advanced level personal computer users and network administrators who are interested in protecting Windows-based computer assets against malicious mobile code. I am assuming you have an adequate understanding of PC mechanics, such as the concepts of booting, the difference between a program executable and a data file, and what the World Wide Web and the Internet are.
Software Covered in This Book
This book explicitly covers the most popular PC hardware and software combination in the world -- Microsoft software running on IBM-compatibles with Intel chip sets. Whenever someone writes about software it is hard to prevent the text from becoming obsolete by newer versions of the software. This book was prepared using Microsoft Internet Explorer versions 5.01 and 5.5, Microsoft Windows 98, Microsoft Windows NT, Microsoft Windows 2000 Professional, Microsoft Outlook 2000, Microsoft Office 2000, and Microsoft Windows ME. The menu choices and feature sets described in this text reflect those versions. Often the features described are located in a different menu location, or are missing all together in earlier versions. In many instances, I have noted when a particular feature was added to the software program. One quick note: Most of the features noted in Internet Explorer 5.x's Tools---> Internet Options are located under View--->InternetOptions in Explorer 4.x.
There is a web page for this book, which lists errata, examples, or any additional information. You can access this page at:
http://www.oreilly.com/catalog/malmobcode
Fast non-rapidshare mirror:
http://mihd.net/1.703/OReilly-Malicious.Mobile.Code.Virus.Protection.for.Windows.rar.html