Skip to content

Computer Viruses and Malware

Best in textbook rentals since 2012!

ISBN-10: 0387302360

ISBN-13: 9780387302362

Edition: 2006

Authors: John Aycock

List price: $139.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Computer Viruses and Malware discusses the historical research regarding computer viruses and malware. Since the internet is omnipresent, companies have increasingly put critical resources online. This has given rise to the activities of cyber criminals.nbsp; This book introduces cutting edge anti-virus software as well, that is available today to fight against these hackers.Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
Customers also bought

Book details

List price: $139.99
Copyright year: 2006
Publisher: Springer
Publication date: 7/20/2006
Binding: Hardcover
Pages: 228
Size: 6.10" wide x 9.25" long x 0.30" tall
Weight: 2.530
Language: English

John Aycock is an Army veteran and illustrator. Growing up in Mississippi, John won art awards in school and from the Meridian Museum of Art. After serving in the infantry for over six years deployed in Iraq and Afghanistan, John returned to the United States to start a family, finish his college education and focus on his art.

Dedication
List of Figures
Preface
We've Got Problems
Dramatis Personae
The Myth of Absolute Security
The Cost of Malware
The Number of Threats
Speed of Propagation
People
About this Book
Some Words of Warning
Definitions and Timeline
Malware Types
Logic Bomb
Trojan Horse
Back Door
Virus
Worm
Rabbit
Spyware
Adware
Hybrids, Droppers, and Blended Threats
Zombies
Naming
Authorship
Timeline
Viruses
Classification by Target
Boot-Sector Infectors
File Infectors
Macro Viruses
Classification by Concealment Strategy
No Concealment
Encryption
Stealth
Oligomorphism
Polymorphism
Metamorphism
Strong Encryption
Virus Kits
Anti-Virus Techniques
Detection: Static Methods
Scanners
Static Heuristics
Integrity Checkers
Detection: Dynamic Methods
Behavior Monitors/Blockers
Emulation
Comparison of Anti-Virus Detection Techniques
Verification, Quarantine, and Disinfection
Verification
Quarantine
Disinfection
Virus Databases and Virus Description Languages
Short Subjects
Anti-Stealth Techniques
Macro Virus Detection
Compiler Optimization
Anti-Anti-Virus Techniques
Retroviruses
Entry Point Obfuscation
Anti-Emulation
Outlast
Outsmart
Overextend
Armoring
Anti-Debugging
Anti-Disassembly
Tunneling
Integrity Checker Attacks
Avoidance
Weaknesses Exploited
Technical Weaknesses
Background
Buffer Overflows
Integer Overflows
Format String Vulnerabilities
Defenses
Finding Weaknesses
Human Weaknesses
Virus Hoaxes
Worms
Worm History
Xerox PARC, c. 1982
The Internet Worm, November 1988
Propagation
Initial Seeding
Finding Targets
Deworming
Defense
User
Host
Perimeter
Capture and Containment
Honeypots
Reverse Firewalls
Throttling
Automatic Countermeasures
"Applications"
Benevolent Malware
Spam
Access-for-Sale Worms
Cryptovirology
Information Warfare
Cyberterrorism
People and Communities
Malware Authors
Who?
Why?
The Anti-Virus Community
Perceptions
Another Day in Paradise
Customer Demands
Engineering
Open Questions
What Should We Do?
References
Index