Access "Secure Reads: The Art of Computer Virus Research and Defense"
This article is part of the May 2005 issue of Keeping on top of risk management and data integrity essentials
The Art of Computer Virus Research and Defense By Peter Szor 713 pages, $49.99 Symantec Press @exb The Art of Computer Virus Research and Defense @exe Need a deep, technical understanding of virus and antivirus technology? Weighing in at more than 700 pages, Virus Research and Defense is the literal "brain dump" of Peter Szor, a renowned virus expert. Nothing else even comes close in terms of giving the reader the ultimate in virus analysis theory and practice. The book is split into the familiar dichotomy: attack methods and defense methods. In the first section, Szor sets the stage for his epic work, not only providing the computer science and mathematical theories underlying computer viruses (e.g., John von Neumann's automata models), but also recounting their history starting with the "Creeper" virus in the early 1970s. "Species" of viruses--each dedicated a separate section--are organized in a logical hierarchy. For example, Szor divides the chapter on "Classification of Infection Strategies" into three basic sections: boot viruses, file infection ... Access >>>
Premium Content for Free.
Desktop Security: GreenBorder Enterprise Security
GreenBorder Technologies' GreenBorder Enterprise Security Solution
Snapping on SNMPv3
The ubiquitous management protocol is more secure, but upgrading isn't simple.
Hot Pick: Polivec Compliance Management System 3.7
Polivec's Polivec Compliance Management System 3.7
It doesn't come easy when you federate identity management.
SonicWALL's PRO 1260
Big Brother's Watchful Eye
Our survey finds that enterprises are spending big on management systems to meet regulatory requirements.
- Desktop Security: GreenBorder Enterprise Security
Recent Releases: Security product briefs, May 2005
Read about the information security products released in May 2005.
Keeping the Data & Oil Flowing
When ChevronTexaco puts a drill in the ground, it must live with that decision for decades. Risk management and data integrity are essential.
Secure Reads: The Art of Computer Virus Research and Defense
Read a review of The Art of Computer Virus Research and Defense.
Instant Messaging: Akonix L7 Enterprise 4.0
Akonix Systems' Akonix L7 Enterprise 4.0
Vernier Networks' EdgeWall 7000 series
- Recent Releases: Security product briefs, May 2005
Layer 8: Debating policy vs. technology
Logoff: Let's not cheapen information security certifications
Dollars & Certs
Perspectives: Windows Server 2003 security stands up
One study concludes that Windows Server 2003 is more secure than Linux.
Ping: Bruce Bonsall
MassMutual's Bruce Bonsall
Editor's Desk: Targeted malware
- Layer 8: Debating policy vs. technology
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...