- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans Paperback – Oct 3 2002
Special Offers and Product Promotions
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
From the Back Cover
Inoculate your network against the viruses, worms, and Trojans of today -and tomorrow
Virus writers are becoming craftier and more numerous every year, resulting in huge losses-in revenue, data, productivity, and reputation-for companies and organizations around the world. Going beyond the partial ?xes of today's off-the-shelf security solutions, this book delivers the hands-on strategies and tactics you need to foil malicious code-and protect the integrity of your network. Drawing on his day-to-day networking experience, security expert Douglas Schweitzer describes the threats-both current and projected-and offers detailed, practical advice for securing BIOS, boot sequences, e-mail, instant messaging, Web servers, and more. It's all you need to lock out viruses-and lock down security for your network.
You'll learn how to:
* Understand the threat virus writers and hackers pose
* Get a handle on various types of malicious code
* Protect BIOS, booting, ?le systems, memory, and other basics
* Secure e-mail, browsers, and ?le sharing
* Eliminate virus threats to instant messaging
* Mobilize staff against the threat of viruses and social engineering
* Strengthen ?rewalls, intrusion detection, and data recovery
* Defend against server-side exploits
* Prepare for cyberterrorism and the viruses of the future
The companion Web site contains multiple links to security software solutions.
About the Author
Douglas Schweitzer, A+, Network+, i-Net+, CCNA, CIW, Brainbench Internet Security Certi?ed, is vice-president at an actuarial consulting ?rm, where he is responsible for network security and design. He is also the author of Internet Security Made Easy.
Inside This Book(Learn More)
WHETHER MODERN DAY MALICIOUS code takes the form of a virus, worm, or Trojan horse program, it poses a real threat to organizational networks, causing damage that is often debilitating. Read the first page
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Top Customer Reviews
"While it did not carry a damaging payload, it did prove the concept that cross-platform Java viruses could be written. Strange Brew, however, affects only Java applications, not Java applets (the small Java scripts) that typically run inside a Web browser. Because the Java Virtual Machine has built-in security measures, it does not allow Java applets direct access to the hard disk nor the ability to modify applications. This prevented Strange Brew from reaching other Java code and causing harm.
In January of 1999, the second known Java virus, called Java.BeanHive, was discovered. This virus was designed to infect both Java applets as well as Java applications. Remember, Java applets are small Java programs (written in Java Script) that are often used on Web sites that are downloaded and run by Web browsers while users surf the Internet."
This makes me wonder what other uncaught mistakes are in the book and just how correct the author's facts, and therefore how correct his conclusions are.
desktops to manage. With the propagation of various worms & trojans on the 'net these days, good references are a necessity. "Securing the Network" stands out above the
crowd to offer clear, concise information and recommendations to protect valuable & sensitive data. The appendices alone contain a veritable treasure trove of information.
I keep nearby as a great reference and would highly recommend it to anyone who is involved with/concerned about network security.
order I placed on December 6 and am still awaiting on Dec. 14
could someone please contact me about this order #701-04224993560329 Thanking you in advance....MARY CALVO
Most recent customer reviews
Hey..I followed the procedures outlined in this book and was spared from the Slammer virus. This book works!Published on Jan. 31 2003
I must say that this book provides good sound advice that is easy to comprehend. Using the techniques outlined in this book, I feel safe and secure against hackers and malcious... Read morePublished on Jan. 29 2003 by David
I really liked this book. This is a how-to book, beginning with the psycology of virus writers. It covers everything on how to protect your computer and network from malicious... Read morePublished on Dec 5 2002
I read this book scared of all that lurks in cyberspace. And while I'm still scared, I'm no longer in the dark. Very informative read.Published on Nov. 17 2002 by Clayton T Stewart
Look for similar items by category
- Books > Business & Investing > Industries & Professions > E-commerce
- Books > Computers & Technology > Certification Central
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > Networks
- Books > Computers & Technology > Software
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > Textbooks > Computer Science & Information Systems > Networking