Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)

Buy

Here are some sure things: you can't get a virus by simply reading an email. Malicious code can't harm hardware. A virus can't hide from a booted, write-protected diskette. Your computer can't get infected from a picture file. I have given this advice hundreds of times and could repeat it in my sleep. It was the mantra of every antivirus researcher. We had to repeat it to every inquiring emailer asking if today's computer virus hoax was something to be afraid of. There was only one problem. We were wrong! Well, we weren't wrong at the time. Then the Internet became everything. Computers advanced. New computer languages were created. Old languages were expanded. Writing programs became easier and so did writing malicious code to do bad things. Write it once today and spread it to 60 million computers tomorrow.

Worms, like Melissa and I Love You, routinely shut down tens of thousands of networks in hours. The CIH virus erased the hard drives and corrupted the ROM BIOS chips of over ten thousand computers in a single day. You can unwittingly click on a hacker web site that later on records your credit card and bank account information when you log onto your bank's "secure" web site. Simply joining an instant messaging conversation can allow complete access to your home system. When browsing the Internet, your browser will automatically download and run programs. A rogue program can harm your system and all you did was surf the Web. Today, more than ever, malicious mobile code can hurt your system.

There are over fifty thousand different computer viruses, Trojan horses, and malicious Internet programs. Hundreds of web sites and dozens of international hacker clubs are dedicated solely to silently invading your computer system. They have contests with prizes to see who can write the most wicked creation. There is a lot of collective personal effort directed toward destroying your privacy and data. If your job involves computers, malicious programs can be more than an inconvenience. This book will help you protect your Microsoft Windows system and networks.

(HTML tags aren't allowed.)

Linux Troubleshooting Bible
Linux Troubleshooting Bible

If something goes wrong, roll up your sleeves, then troubleshoot and fix Linux yourself!

Commercial support packages for Linux can be expensive. This unique book gives you the power to diagnose and fix a wide range of Linux problems. Using Fedora Core Linux and Red Hat Enterprise Linux examples, Thomas Weeks and bestselling Red Hat...

Beginning Robotics with Raspberry Pi and Arduino: Using Python and OpenCV
Beginning Robotics with Raspberry Pi and Arduino: Using Python and OpenCV

Learn how to use a Raspberry Pi in conjunction with an Arduino to build a basic robot with advanced capabilities. Getting started in robotics does not have to be difficult. This book is an insightful and rewarding introduction to robotics and a catalyst for further directed study. 

Fully updated...

CISA Review Manual 2008
CISA Review Manual 2008
The CISA Review Manual 2008 has been completely revised and updated with new content to reflect changing industry principles and practices, and is organized according to the current CISA job practice areas. The manual features detailed descriptions of the tasks performed by IS auditors and the knowledge required to plan, manage and perform IS...

COBOL and Visual Basic on .NET: A Guide for the Reformed Mainframe Programmer
COBOL and Visual Basic on .NET: A Guide for the Reformed Mainframe Programmer

BOL and Visual Basic on .NET is a comprehensive guide to help mainframe programmers successfully complete a .NET retraining effort. This book is intended for the COBOL/CICS mainframe community of programmers making the transition from the mainframe to .NET, and also for those who simply wish to broaden their .NET knowledge base.

...
Accounting Best Practices (Wiley Best Practices)
Accounting Best Practices (Wiley Best Practices)

The accounting department is a cost center. It does not directly generate revenues, but, rather, provides a fi xed set of services to the rest of the company, and is asked to do so at the lowest possible cost. Consequently, the accounting staff is called on to process transactions, write reports, create new processes, or investigate old...

A Kick in the Attitude: An Energizing Approach to Recharge your Team, Work, and Life
A Kick in the Attitude: An Energizing Approach to Recharge your Team, Work, and Life

What Jumper Cables are to A Car Battery this Book is to YOUR Attitude

"Good old fashioned advice on how to have a great attitude, delivered in a pithy andinteresting way."
—Karen Leland, bestselling author of Watercooler Wisdom: How Smart People Prosper in the Face of Conflict, Pressure and
...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy