Computer Virus Books We are witnessing on escalating computer-virus arms race – virus, vaccine, counter-virus – that has created a whole anti-virus industry.. software programs, consultants, and many books. The most reliable intelligence from this conflict has been collected in Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System, by John McAfee. When corporations in Silicon Valley discover a virus, they call McAfee, who arrives in a specially outfitted virus-buster van. " His book, written for the computer-security trade, gives a comprehensive dossier of all known viral strains, post and present (up to fall 1989), and much insider scuttlebutt that is very readable for the lay user. On the other hand, Virus! by Allan Lundell is a wild, irresponsible, and highly speculative book that dramatically exaggerates the subtle attributes of computer viruses, and therefore is the more revealing one, in a vaudeville way. It tackles the question, "What does a computer virus moon?" Treat what is said as well- founded rumor. There's probably more in these two books than most want to know, but for both computer crime- and computer life-watchers, the trail begins here.
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
Continue reading “Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software”
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware.
Continue reading “Advanced Malware Analysis”
In this book you'll learn everything you wanted to know about computer viruses, ranging from the simplest 44-byte virus right on up to viruses for 32-bit Windows, Unix and the Internet. You'll learn how anti-virus programs stalk viruses and what viruses do to evade these digital policemen, including stealth techniques and poly-morphism. Next, you'll take a fascinating trip to the frontiers of science and learn about genetic viruses. Will such viruses take over the world, or will they become the tools of choice for the information warriors of the 21st century? Finally, you'll learn about payloads for viruses, not just destructive code, but also how to use a virus to compromise the security of a computer, and the possibility of beneficial viruses.
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.
Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware’s ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware’s intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.
Continue reading “Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat”