Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Qty:1
  • List Price: $39.95
  • Save: $6.03 (15%)
Usually ships within 3 to 5 weeks.
Ships from and sold by Amazon.com. Gift-wrap available.
Malicious Mobile Code: Vi... has been added to your Cart

Ship to:
To see addresses, please
or
Please enter a valid US zip code.
or
FREE Shipping on orders over $25.
Used: Very Good | Details
Sold by Orion LLC
Condition: Used: Very Good
Comment: Book is lightly used with little or no noticeable damage. .

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Malicious Mobile Code: Virus Protection for Windows Paperback – August 24, 2001

4.7 out of 5 stars 6 customer reviews

See all 2 formats and editions Hide other formats and editions
Price
New from Used from
Paperback
"Please retry"
$33.92
$7.00 $0.33
$33.92 FREE Shipping. Usually ships within 3 to 5 weeks. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

  • Malicious Mobile Code: Virus Protection for Windows
  • +
  • Malware: Fighting Malicious Code
Total price: $76.70
Buy the selected items together

NO_CONTENT_IN_FEATURE
China
Engineering & Transportation Books
Discover books for all types of engineers, auto enthusiasts, and much more. Learn more

Product Details

  • Paperback: 544 pages
  • Publisher: O'Reilly Media; 1 edition (August 24, 2001)
  • Language: English
  • ISBN-10: 156592682X
  • ISBN-13: 978-1565926820
  • Product Dimensions: 7 x 1 x 9.2 inches
  • Shipping Weight: 1.7 pounds (View shipping rates and policies)
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Best Sellers Rank: #2,784,543 in Books (See Top 100 in Books)

Customers Viewing This Page May Be Interested In These Sponsored Links

  (What's this?)

Customer Reviews

5 star
83%
4 star
0%
3 star
17%
2 star
0%
1 star
0%
See all 6 customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
I've been in the computer consulting field for over 10 years (DOS, Novell, and Microsoft), and during all that time I've been fighting viruses, and now emailing worms, for my clients. I've always installed the latest antivirus software and told my clients how to treat suspicious emails or files. And while this advice has always worked on my company's network, it seems rarely to have worked at my customer's locations. Mr. Grimes talks about the same experiences in the book. (I was passed an early copy of the book by one of my friends in the antivirus industry). To make a long story short, the book's advice works. It's all commonsense stuff after you read it, and it showed me some new prevention tactics that I will continue to use with existing and future clients.
As for example, one of my clients, with about 100 workstations, seemed to get infected about every three days no matter what I would tell them (one person in particular). And although I love the consulting dollars, it really became a pain disinfecting their network again and again. I followed the steps in the book, and my clients haven't been infected since. It's only been a month, but they went from dozens of infections per week, to none.
Every chapter in the book covers a particular topic, like Windows viruses, Instant Messaging attacks, Email attacks, etc. Mr. Grimes begins by describing the underlying technology, talks about specific attacks, and then tells how to detect and prevent them. Each chapter has dozens of recommendations and his last chapter (actually second to last) talks about what steps you should take on each PC you supervise. This was nice because trying to remember the dozens of steps to take all at once would have been tough.
Read more ›
Comment 14 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Keeping up with computer security is a full time job. Grimes has given a clear, precise primer of one aspect of computer security - viruses, trojans, worms - collectively known as malicious mobile code. The book is DOS/Windows centric, but this focus helps you see a) where the threats for the most part, and b) allows you to extend the types of threats into other operating systems. You are taken step by step through the development of malicious code and how and why they can work on some systems, but less effectively on others. The constant refrain of the book shows the author's philosophy: Use an up to date anti-virus product. But if somethign slips by, Grimes shows you ways to react, and lessen the impact if not to this once computer, but to the rest on the network. It is easily one of the most readable books I have encountered on the subject.
This book is an essential reference for any computer manager's toolkit. We can't stop the code writers from producing thier output, but we can work to lessen the impact they can have on us.
Comment 9 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
More important than anything else I can say about this book is that it was a good read! Being subject to often boring books on algorithms, and operating systems, this book kept me captivated with its straight forward presentation, and even more remarkable stories. Even if you never plan to start editting a registry, this book is worth reading.
What I got most from this book though was a perpective on dealing with virus (etc) problems overall. Identifying what area of a system needs examining, what precautions should be taken, and even classifying symptoms, was very enlightning. That it was also a major source in a paper I received an A on, doesn't hurt either. I am sure it will come in as a handy reference for some time yet.
Comment 5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse


Pages with Related Products. See and discover other items: computer security