Computer Viruses and Malware by John Aycock (auth.)

By John Aycock (auth.)

Our Internet-connected society more and more depends upon desktops. therefore, assaults on pcs from malicious software program have by no means been an even bigger challenge. Computer Viruses and Malware attracts jointly hundreds and hundreds of assets to supply an extraordinary view of malicious software program and its countermeasures. This booklet discusses either the technical and human elements occupied with computing device viruses, worms, and anti-virus software program. It additionally appears to be like on the program of malicious software program to laptop crime and knowledge warfare.

Computer Viruses and Malware is designed for a qualified viewers composed of researchers and practitioners in undefined. This publication is additionally compatible as a secondary textual content for advanced-level scholars in laptop science.

Show description

Read or Download Computer Viruses and Malware PDF

Best security & encryption books

Error control coding: from theory to practice

This creation to simple coding concepts makes use of examples to give an explanation for basic innovations and their purposes. complicated arithmetic are stored to a minimal. Drawing from electronic communications and knowledge conception, the e-book emphasizes the choice of applicable codes and the layout of decoders. Chapters disguise convolution codes, linear block codes, cyclic codes, finite box mathematics, BCH codes, Reed Solomon codes, functionality calculations for block codes, multistage coding, and iterative coding.

Swanson on Internal Auditing Raising the Bar

This e-book offers concise observation on strategic concerns in regards to the means inner audit is verified, deliberate and played. High-level matters sit down along sensible advice to make sure the booklet has an attract all degrees of inner audit administration and employees, as each one reader can dip right into a variety of significant themes.

Multimedia Content Encryption: Techniques and Applications

The frequent use of photograph, audio, and video information makes media content material security more and more precious and pressing. for max defense, it truly is now not adequate to simply regulate entry rights. for you to absolutely shield multimedia information from piracy or unauthorized use, it needs to be secured via encryption ahead of its transmission or distribution.

Smart TV Security: Media Playback and Digital Video Broadcast

This booklet discusses the rising subject of clever television defense, together with its implications on buyer privateness. the writer provides chapters at the structure and performance of shrewdpermanent TVs, numerous assaults and defenses, and linked dangers for shoppers. This contains the most recent assaults on broadcast-related electronic providers and integrated media playback, in addition to entry to built-in cameras and microphones.

Extra resources for Computer Viruses and Malware

Sample text

In general, infecting the boot sector is strategically sound: the virus may be in a known location, but it establishes itself before any anti-virus software starts or operating system security is enabled. But BSIs are rare now. ^ From a defensive point of view, most operating systems prevent writing to the disk's boot block without proper authorization, and many a BIOS^ has boot block protection that can be enabled. 2 COMPUTER VIRUSES AND MALWARE File Infectors Operating systems have a notion of files that are executable.

They also point out that non-destructive viruses have an increased chance of survival, by not drawing attention to themselves. 4 These three definitions are based on Harley et al. ' 5 Insofar as a worm can be said to stand. 6 This farsighted book also included ideas about an internet and laser printers [50]. 7 The Xerox work is described in Shoch and Hupp [287], and both they and Dewdney [91] mention Creeper and Reaper. There were two versions of Creeper, of which the first would be better called a rabbit, the second a worm.

For example, the "B" variant of the Blaster worm was released by someone who had acquired a copy of the "A" variant and modified it [330]. 27 A few, like Gaobot, have hundreds of variants, and require three letters to describe their variant! 28 This example is from [47], again with vendor information removed. 29 Dellinger's "Virus 2" spread courtesy of the virus writer's friends [87], and secondhand stories indicate that Stoned was spread by someone besides its author [119,137,290]. Malware writers are rarely caught or come forward, so discovering these details is unusual.

Download PDF sample

Rated 4.92 of 5 – based on 20 votes