Featured Computer Viruses:
Computer Viruses For Dummies (For Dummies (Computer/Tech))
* Offers real, practical solutions to help ordinary users keep viruses out of their e-mail in-boxes-and explains how to respond when one slips through
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated billion and did untold damage to home computers
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits
* The book’s value price and compact size will make it irresistible to people who need to protect their home PC or network
Rating: (out of 2 reviews)
List Price: $ 14.99
Price: $ 5.40
Computer Viruses For Dummies (For Dummies (Computer/Tech)) Reviews
Review by John Matlock:
The one thing about viruses that I’ve always wanted to know: why do people want to write and propagate virus programs. Surprisingly he does make some comments about virus writers, not to specifically identify them, but to give some history and general comments. I don’t know that this was a help, but it’s at least interesting.
Beyond viruses, this book also goes into other forms of nasty programs like Trojan Horses, HiJackers (that replace your home page with theirs), worms, Phishing Scams, and Spyware. I’d have liked to have seen just a little more about some of these, such as an evaluation of the anti- software that is available.
Like all the For Dummies books, this is a good introductory book, not the final word. But if you have a computer connected to the web, you’d best be paying at least some attention to Viruses, and this is a good start.
Buy Computer Viruses For Dummies (For Dummies (Computer/Tech)) now for only $ 5.40!
The Art of Computer Virus Research and Defense
Peter Szor takes you behind the scenes of anti-virus research, showing howthey are analyzed, how they spread, and–most importantly–how to effectivelydefend against them. This book offers an encyclopedic treatment of thecomputer virus, including: a history of computer viruses, virus behavior,classification, protection strategies, anti-virus and worm-blocking techniques,and how to conduct an accurate threat analysis. The Art of Computer VirusResearch and Defense entertains readers with its look at anti-virus research, butmore importantly it truly arms them in the fight against computer viruses.As one of the lead researchers behind Norton AntiVirus, the most popularantivirus program in the industry, Peter Szor studies viruses every day. Byshowing how viruses really work, this book will help security professionals andstudents protect against them, recognize them, and analyze and limit thedamage they can do.
Rating: (out of 25 reviews)
List Price: $ 54.99
Price: $ 19.92
The Art of Computer Virus Research and Defense Reviews
Review by Richard Bejtlich:
Peter Szor’s ‘The Art of Computer Virus Research and Defense’ (TAOCVRAD) is one of the best technical books I’ve ever read, and I’ve reviewed over 150 security and networking books during the past 5 years. This book so thoroughly owns the subject of computer viruses that I recommend any authors seeking to write their own virus book find a new topic. Every technical computing professional needs to read this book, fast.
I read this book from cover to cover. The author does not lie when he says acquiring the same amount of information requires digging in obscure virus journals and analyzing malicious code. TAOCVRAD’s single most powerful aspect is the author’s persistence in naming one or more sample viruses that exemplify whatever concept he is discussing. In other words, all of his theory is backed by, or builds on, real-life examples. Each chapter contains moderate end-notes that provide pointers for additional research.
A truly great book has the power to change deeply-entrenched opinions, or make readers look at old problems in a new light. In my case, I altered my perception of the virus problem and ways to fight it. First, I changed my concept of viruses and worms. Peter builds on Fred Cohen’s virus definition to say ‘a computer virus is a program that recursively and explicitly copies a possibly evolved version of itself.’ He calls worms a ‘subclass of computer viruses.’ I used to disagree with Peter; I believed a virus infects files and requires user interaction, and a worm spreads by itself via the network. Now I agree with Peter’s viewpoint: ‘worms are network viruses, primarily replicating on networks… If the primary vector of the virus is the network, it should be classified as a worm.’ The distinction is subtle, but it makes sense to consider worms a subclass of viruses given Peter’s extensive analysis of both types of malware.
Second, I recognized I held an opinion Peter considers unfortunate: ‘some computer security people do not seem to consider computer viruses as a serious aspect of security, or they ignore the relationship between computer security and computer viruses.’ I was guilty as charged. I used to positively detest viruses because they seemed like mindless automated code that did little but replicate. After reading about scores of real viruses, I have a profound appreciation for virus technology. Viruses introduced techniques for obfuscation, stealth, and exploitation a decade earlier, in some cases, than the single-shot exploit code we see today.
Third, Peter put a human face on the problems associated with closed-source operating systems like Microsoft Windows. Many so-called Native API calls are undocumented, and as such make life difficult for anti-virus developers. (Virus writers tend to know them.) With Microsoft entering the anti-virus market, will it leverage these secrets to outperform competitors lacking this internal knowledge?
Readers of Ed Skoudis’ ‘Malware’ or Jose Nazario’s ‘Defense and Detection Strategies against Internet Worms’ will find this new book greatly complements those two works. Those wishing to get the most value from TAOCVRAD should have Intel assembly coding skills and several years of hands-on security experience.
I had almost no issues with this book, which is striking given it is nearly 700 pages long. In a few places I found the language a little rough, but not enough to bother me. I believe a code listing on p. 372 should show a ‘
Review by Dr Anton Chuvakin:
If the phase “a bible of malware” weren’t a cliché, I would have used it to describe this book without hesitation. I read a lot of security (and specifically, malware) titles, but I have never seen a book that comprehensive and detailed, period.
The author appears to know _everything_ that was going on in the malicious software space since the 80s (for example, who knew that there were viruses written in DEC’s DCL language)… A lot of effort is spent classifying various infection, in-memory, self-protection, payload and other virus strategies. I loved the section on malware self-protection, such as anti-debugging and anti-disassembly tactics and even self-brute-forcing virus code (I never knew there are sooo many of those tricks). Nowhere else I saw the detailed explanation of oligomorphic, polymorphic and metamorphic viruses… Note that while the book does cover the fun historical viruses, its coverage extends all the way to phishing attacks of the 2004-2005.
My other favorite part is the chapter on worms. “Vanilla” viruses often feel like the creatures of the past, and the worms steal all the glory. The other holds a view that worms are just a type of viruses that he justifies fairly well. Indeed, there is no accepted definition of a “worm”.
The book is obviously aimed towards virus defense, although both sides are covered in [at times] excruciating detail. The entire part is dedicated to history and technology of virus scanning. Personally, I never saw it covered with that level of detail. Finally, I had a chance to learn what `heuristic detection’ means. On the defense side, the book also covers behavior blocking and host intrusion prevention, which has a chance of emerging as the main approaches of virus fighting, supplanting pure signature-based scanning. Similarly fun was a section on network-level defense strategies (such as using ACLs, firewalls, etc).
A surprisingly small chapter covers malicious code analysis techniques. I would have appreciated a more detailed info on using VMware for malware analysis.
Overall, the book is very technical, but (if need be) can be read without diving too deeply into PDP11 assembly , just to get familiar with all the malware classifications, infection methods and other tricks. Highly recommended for technical security professionals, might also benefit others in IT and beyond. I think it will also fit the textbook profile for an advanced computer security course.
Anton Chuvakin, Ph.D., GCIA, GCIH, GCFA is a Security Strategist with a major security company. He is an author of the book “Security Warrior” and a contributor to “Know Your Enemy II”. In his spare time, he maintains his security portal info-secure.org
Buy The Art of Computer Virus Research and Defense now for only $ 19.92!
Computer Viruses and Malware
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
List Price: $ 99.00
Price: $ 79.11
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions enable a precise and exhaustive description of the different types of malware. It follows that the main stakes of computer defense and antiviral fighting are easily highlighted. Detailed analysis of the source code for representative members of each virus/worm family allows the reader to grasp the basic algorithmic aspects involved in self-reproducing codes. The C programming language has been systematically used for a better understanding of the considered codes.
Rating: (out of 2 reviews)
List Price: $ 72.95
Price: $ 999.97
Computer Viruses: from theory to applications (Collection IRIS) Reviews
Review by W Boudville:
Filiol takes an ab initio approach to computer viruses. He gives a description rooted in the use of a Turing machine. But also using ideas from cellular automata research. The idea is to give a rigorous understanding of viruses, that is independent of any given hardware or software. A key theme is that the code be somehow able to reproduce.
But the book is not just for a theorist. He also directs it towards the user who has to devise an antivirus detector. So source code for several different types of viruses are given (in C). This lets you get a hands-on approach to tackling the problem. Of course, not all possible viruses are covered. This may be a theoretical impossibility. But enough examples are given that you can confidently understanding much that is out there.
Buy Computer Viruses: from theory to applications (Collection IRIS) now for only $ 999.97!
A Short Course on Computer Viruses (Wiley Professional Computing)
From the reviews of the first edition “Cohen has been writing and speaking on viruses since they were just glimmerings in the eyes of … minded computer scientists. And, as a … minded scientist himself, Dr. Cohen does know his stuff.” —EXE Magazine “This book is fun to read (a rarity in this field) and seemingly near faultless in the majority of its conclusions. Considering the author’s considerable achievements, it is also written with admirable modesty.” —Virus Bulletin Here is an outstanding opportunity to learn about computer viruses from the internationally acclaimed pioneer in the field who actually coined the phrase “computer virus.” This new edition of Cohen’s classic work has been updated and expanded to nearly double its original size and now includes entirely new chapters on LAN viruses, international viruses, and good viruses (including code). As entertaining as it is thorough, the text is enlivened by Cohen’s down-to-earth wit and his many fascinating anecdotes and heretofore unpublished historical facts about viruses. Both broad in its coverage and deep in its consideration, it includes dozens of lucid explanations and examples that amicably guide the reader through the complex, often convoluted subject matter. Hailed as a tour de force, Cohen’s discussion of defensive strategies reveals many of the stumbling blocks that often trip readers up. Among the breakthroughs and exciting new developments you’ll find only in this book are:A new analysis of the epidemiology of computer virusesNew forms of virus evolution that will render most current defenses uselessNew strategies and tactics in virus defensesNew analyses of synergistic effects in attack and defenseIt is rare in the computer world to find someone both technically and verbally adept. It is even rarer to find yourself laughing out loud when reading a computer text. Fred Cohen is not only a
Rating: (out of 3 reviews)
List Price: $ 34.95
Price: $ 34.95
A Short Course on Computer Viruses (Wiley Professional Computing) Reviews
Review by R. Smith:
Fred Cohen did pioneering research work in viruses and this book is a survey of virus technology. The book covers the general topic of malicious software from a solid technical level. The book provides no magic bullets either for stopping viruses nor for writing them (there aren’t any), but he nails the technology right on. Sill a worthwhile book even though it predates the popularization of active content like Java and the outbreaks of macro viruses in Office applications.
Review by Kevin D. Peterson:
This book is not about how to write viruses or how to protect yourself from them. It’s about the theoretical aspects of viruses. It’s a good book. Not great writing, sometimes too difficult theory, leaves out some stuff that could be included now. It’s pretty much required reading if you want to really understand how viruses work, not just how to operate your anti virus software, or how to create a new variant of an Outlook virus. It can elevate your thinking about viruses above the specifics of what is going on with today’s viruses under today’s security models.
Buy A Short Course on Computer Viruses (Wiley Professional Computing) now for only $ 34.95!
A petite red-headed computer whiz with a shady past discovers a COMPUTER VIRUS that is FATALLY INFECTING COMPUTER USERS all over the country! The Center for Disease Control in Atlanta dubs it “CompuFlu” – But other computer users are affected in a totally different way – they discover that they have STRANGE NEW POWERS! All are beset by frightening nightmares of a wizened old creature they call “The Gray Man.” Ultimately it is he who beckons them to the Smoky Mountains of North Carolina, where they all meet and learn the fate he has planned for them … and for the WORLD!
Rating: (out of 2 reviews)
List Price: $ 15.95
Price: $ 15.53
Virus 2.0 Reviews
Review by Winnie:
“Sydney” is a great character, she has lots of “faults” but she is aware of them. She is spunky and impulsive, sort of like a “Lois Lane” character. Other characters are good and very believable (except for the characters in the —- well, I don’t want to give anything away, but there is a group of hilarious characters later in the story!) “Tommy” is a real surprise, and the book is fast-moving and hard to put down. I left it in the car and ran out in the rain to get it so I could keep reading it!
Buy Virus 2.0 now for only $ 15.53!
Malicious Mobile Code: Virus Protection for Windows (O’Reilly Computer Security)
Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack.Defending Microsoft Windows against viruses requires careful attention to emerging technical alerts and diligence in installing manufacturers’ latest patches and upgrades. You’ll do a better job of keeping Windows secure if you have a body of background knowledge about security weaknesses in Windows and familiarity with good security practices. That, for the most part, is what Malicious Mobile Code is about. Roger Grimes shares facts, tells stories, and reveals technical details that will make you realize how serious a threat is posed by malicious mobile code (a catch-all term Grimes uses to describe viruses, Trojans, and the like). Further, his exposition will likely motivate you to take the precautions he recommends. Some of Grimes’s advice is by now obvious (don’t run executable files that arrive attached to e-mail messages), but a lot of it will be news to Windows users and even system administrators. For example, he goes into considerable detail on how BackOrifice works, with particular attention to how black-hat hackers use it to build networks of
Rating: (out of 6 reviews)
List Price: $ 39.95
Price: $ 4.81
Malicious Mobile Code: Virus Protection for Windows (O’Reilly Computer Security) Reviews
Review by Miguel Rodriguez:
I’ve been in the computer consulting field for over 10 years (DOS, Novell, and Microsoft), and during all that time I’ve been fighting viruses, and now emailing worms, for my clients. I’ve always installed the latest antivirus software and told my clients how to treat suspicious emails or files. And while this advice has always worked on my company’s network, it seems rarely to have worked at my customer’s locations. Mr. Grimes talks about the same experiences in the book. (I was passed an early copy of the book by one of my friends in the antivirus industry). To make a long story short, the book’s advice works. It’s all commonsense stuff after you read it, and it showed me some new prevention tactics that I will continue to use with existing and future clients.As for example, one of my clients, with about 100 workstations, seemed to get infected about every three days no matter what I would tell them (one person in particular). And although I love the consulting dollars, it really became a pain disinfecting their network again and again. I followed the steps in the book, and my clients haven’t been infected since. It’s only been a month, but they went from dozens of infections per week, to none.Every chapter in the book covers a particular topic, like Windows viruses, Instant Messaging attacks, Email attacks, etc. Mr. Grimes begins by describing the underlying technology, talks about specific attacks, and then tells how to detect and prevent them. Each chapter has dozens of recommendations and his last chapter (actually second to last) talks about what steps you should take on each PC you supervise. This was nice because trying to remember the dozens of steps to take all at once would have been tough. He even covers how to make an anti-virus plan, but that doesn’t really apply to my consulting work; however I’m sure it would help a company system admin type.I can easily say I learned more about Virus attacks on Windows, Java, VBA, and Internet apps than I knew before. I was really surprised by how many places bad programs can hide to automatically start on a computer. There are over a dozen. And for a technical book it was really easy reading. It was the best book I’ve ever read, and used, on computer viruses. The book included his email address and I sent a question to him and he answered it the same day. The book covers Windows, no Linux or Mac, but doesn’t cover Novell Groupwise in the email chapter but it is well worth the read. Although most of my clients are Microsoft shops, I’ve still have some Novell shops. It mentions, but doesn’t discuss automated distribution tools, like SMS or ZenWorks. If you’ve got a very large network, you’re going to need a good way to automate all the steps. There are few typos and grammar errors, but certainly not enough to take away from the message. Also, like most other antivirus books, it doesn’t say what antivirus product to get. Mr. Grimes mentions a few different products, but I was really looking for his recommendation (or anyone) to tell me the best antivirus product out there. It seems they all miss something. Other than these few issues, great book and I highly recommend it.
Review by J. J. Kwashnak:
Keeping up with computer security is a full time job. Grimes has given a clear, precise primer of one aspect of computer security – viruses, trojans, worms – collectively known as malicious mobile code. The book is DOS/Windows centric, but this focus helps you see a) where the threats for the most part, and b) allows you to extend the types of threats into other operating systems. You are taken step by step through the development of malicious code and how and why they can work on some systems, but less effectively on others. The constant refrain of the book shows the author’s philosophy: Use an up to date anti-virus product. But if somethign slips by, Grimes shows you ways to react, and lessen the impact if not to this once computer, but to the rest on the network. It is easily one of the most readable books I have encountered on the subject.This book is an essential reference for any computer manager’s toolkit. We can’t stop the code writers from producing thier output, but we can work to lessen the impact they can have on us.
Buy Malicious Mobile Code: Virus Protection for Windows (O’Reilly Computer Security) now for only $ 4.81!
Find more Computer Viruses products on Amazon!