책 이미지
책 정보
· 분류 : 외국도서 > 컴퓨터 > 운영체제(OS) > 윈도우 워크스테이션
· ISBN : 9781565926820
· 쪽수 : 542쪽
· 출판일 : 2001-09-18
목차
Preface
1. Introduction
The Hunt
What Is Malicious Mobile Code?
Malicious Code and the Law
Malicious Code-Writing Subculture
MMC Terminology
Summary
2. DOS Computer Viruses
Introduction
DOS Technologies
DOS Virus Technologies
Types of DOS Viruses
Virus Defense Mechanisms
Examples of DOS Viruses
Detecting a DOS-Based Computer Virus
Removing a DOS Virus
Protecting Yourself from Viruses
Summary
3. Windows Technologies
Windows Technologies
New Windows Versions
Summary
4. Viruses in a Windows World
DOS Viruses on Windows Platforms
Windows Viruses on Windows Platforms
Signs and Symptoms of Windows NT Virus Infections
Windows Virus Examples
Detecting a Windows Virus
Removing Viruses
Removing Infected Files
Preventing Viruses in Windows
Future
Summary
5. Macro Viruses
What Is a Macro Virus?
Microsoft Word and Excel Macros
Working with Macros
Office 2000 Security
Macro Virus Technologies
Macro Virus Examples
Detecting Macro Viruses
Removing Macro Viruses and Repairing the Damage
Preventing Macro Viruses
Summary
6. Trojans and Worms
The Threat
What Are Trojan Horses and Worms?
Signs and Symptoms
Types of Trojans
Trojan Technology
Becoming Familiar with Your PC
Trojan and Worm Examples
Detecting and Removing Trojans and Worms
Preventing Trojans and Worms
Summary
7. Instant Messaging Attacks
Introduction to Instant Messaging
Types of Instant Messaging
Introduction to Internet Relay Chat
Hacking Instant Messaging
Examples of IRC Attacks
Detecting Malicious IM
Removing Malicious IM
Protecting Yourself from IM Attacks
Summary
8. Internet Browser Technologies
Introduction
Browser Technologies
Web Languages
Other Browser Technologies
When to Worry About Browser Content
Summary
9. Internet Browser Attacks
Browser-Based Exploits
Examples of Attacks and Exploits
Detecting Internet Browser Attacks
Removing and Repairing the Damage
Preventing Internet Browser Attacks
Summary
10. Malicious Java Applets
Java
Java Security
Java Exploits
Example Java Exploits
Detecting Malicious Java Applets
Removing Malicious Java Code
Protecting Yourself from Malicious Java Code
Summary
11. Malicious ActiveX Controls
ActiveX
ActiveX Security
ActiveX Security Criticisms
Malicious ActiveX Examples
Detecting Malicious ActiveX Controls
Removing and Preventing Malicious Active Controls
Summary
12. Email Attacks
Introduction
Email Programs
Email Exploits
Detecting Email Attacks
Removing Infected Email
Preventing Email Attacks
Summary
13. Hoax Viruses
The Mother of All Computer Viruses
Categories of Hoax Messages
Detection
Removing and Preventing Hoax Viruses
Summary
14. Defense
Defense Strategy
Malicious Mobile Code Defense Plan
Use a Good Antivirus Scanner
Antivirus Scanning Locations
The Best Steps Toward Securing Any Windows PC
Additional Defense Tools
Antivirus Product Review
Future
Summary
15. The Future
The Future of Computing
MMC Exploits
Real Defense Solutions
Summary
Index














