Get A Pathology of Computer Viruses PDF

By David Ferbrache BSc(Hons) (auth.)

ISBN-10: 1447117743

ISBN-13: 9781447117742

ISBN-10: 3540196102

ISBN-13: 9783540196105

The 1980's observed the appearance of common (and very likely harmful) malicious program an infection of either laptop and mainframe platforms. the pc safety box has been relatively gradual to react to this rising scenario. it is just during the last years major physique of data at the operation, most probably evolution and prevention of computing device viruses has built. A Pathology of machine Viruses supplies a close evaluation of the heritage of the pc virus and an in-depth technical overview of the foundations of trojan horse and trojan horse operation lower than DOS, Mac, UNIX and DEC working platforms. David Ferbrache considers the potential extension of the danger to the mainframe structures setting and indicates how the possibility might be successfully combatted utilizing an antiviral administration plan. the writer addresses the most recent advancements in "stealth" virus operations, in particular the craze for virus authors to undertake huge camouflage and concealment recommendations, which enable viruses to avoid either latest anti-viral software program and to prevent detection via direct remark of laptop behaviour. A Pathology of laptop Viruses addresses a unique want - that of the pc professional who wishes a resource reference paintings detailing all facets of the pc virus threat.

Show description

Read or Download A Pathology of Computer Viruses PDF

Similar security & encryption books

New PDF release: EnCase Computer Forensics -- The Official EnCE: EnCase

The reliable, suggestions Software-approved publication at the most recent EnCE examination! The EnCE examination exams that laptop forensic analysts and examiners have completely mastered laptop research methodologies, in addition to using counsel Software's EnCase Forensic 7. the one professional Guidance-endorsed examine consultant at the subject, this publication prepares you for the examination with huge assurance of all examination issues, real-world eventualities, hands-on routines, updated felony info, and pattern facts documents, flashcards, and extra.

New PDF release: Guidelines on Security and Privacy in Public Cloud Computing

NIST exact booklet 800-144 - Cloud computing can and does suggest various things to assorted humans. the typical features such a lot interpretations proportion are on-demand scalability of hugely on hand and trustworthy pooled computing assets, safe entry to metered companies from approximately at any place, and displacement of knowledge and prone from within to outdoors the association.

Get Introduction to computer networks and cybersecurity PDF

"Draft advent to laptop Networking and Cybersecurity To the scholar it truly is tricky to overstate the significance of machine networks and community safety in contemporary international. they've got turn into such a vital part of our life that just a moment's mirrored image is needed to delineate the various ways that they influence basically each point of our lives.

Extra resources for A Pathology of Computer Viruses

Sample text

The replicated viruses would be executable code fragments which would be run and launched into the environment. These fragments would then seek out and attach to further host programs. This example implies a multi- processing environment. The small resident virus executables are similar to the resident virus components on the IBM PC discussed in the next chapter. The concept of genetic code also differs significantly between current computer systems and biological syst,ems. Specifically, while computer object code may be likened to a codon or nucleotide, it is questionable whether any discernible high level structure exists in most computer code.

Much further work is required in the area of virus theory, particularly with regard to the minimal restrictions on the generality of computing systems which will permit detection of viral replication or malicious software activity. 1. The term "Epeian" is based on the name of the builder of the original Greek trojan horse cited in the Odyssey of Homer. 5 Thompson: and Trusting Trust While on the subject of the inherent difficulties in detecting viruses (or indeed trojan horses), mention must be made of Ken Thompson's 1983 ACM award speech which described a trojan horse in an AT & T Bell C compiler.

A parody of this message was se nt to the USENET security mailing list in January 1989, and advised: Date: 11-31-88 (24:60) Number: 32769 To: ALL Refer#: NONE Read: (N/A) From: ROBERT MORRIS 111 Subj: VIRUS ALERT Status: PUBUC MESSAGE Waming: Therets a new virus on the loose thatts worse than anything Itve seen before! It gets in through the power Iinet riding on the powerline 60 Hz subcarrier. It works by changing the serial port pinouts, and by reversing the direction onets disks spin. Over 300,000 systems,have been hit by it here in Murphy, West Dakota alone!

Download PDF sample

A Pathology of Computer Viruses by David Ferbrache BSc(Hons) (auth.)

by Ronald

Rated 4.96 of 5 – based on 3 votes