|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm54116306 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
040130s2001 caua o 001 0 eng d |
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d UMC
|d CEF
|d OCLCQ
|d CUSER
|d OCLCE
|d AZU
|d NHM
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCO
|d VLB
|d OCLCQ
|d YDX
|d N$T
|d IDEBK
|d TEFOD
|d N$T
|d OCLCQ
|d OCLCA
|d UIU
|d OCLCQ
|d WYU
|d AU@
|d UKAHL
|d VT2
|d GO9
|d INARC
|d UAB
|d LVT
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 326799240
|a 606592204
|a 644443837
|a 729550699
|a 748108415
|a 759519824
|a 809691320
|a 988767626
|a 991285642
|a 993080144
|a 993535504
|a 993699478
|a 999658122
|a 1002008809
|a 1003995623
|a 1019733215
|a 1022753077
|a 1027170642
|a 1029446017
|a 1031318898
|a 1034613201
|a 1037790873
|a 1044220132
|a 1056354658
|a 1060858961
|a 1062958724
|a 1100871439
|a 1103263196
|a 1104446263
|a 1124354522
|a 1129348888
|a 1179124748
|a 1202560981
|a 1240506601
|a 1302274492
|
020 |
|
|
|a 9781491994696
|q (electronic bk.)
|
020 |
|
|
|a 149199469X
|q (electronic bk.)
|
020 |
|
|
|a 9781491994719
|q (electronic bk.)
|
020 |
|
|
|a 1491994711
|q (electronic bk.)
|
020 |
|
|
|a 9781491994702
|q (electronic bk.)
|
020 |
|
|
|a 1491994703
|q (electronic bk.)
|
020 |
|
|
|z 156592682X
|q (pbk.)
|
020 |
|
|
|z 9781565926820
|q (pbk.)
|
029 |
1 |
|
|a HEBIS
|b 291459374
|
035 |
|
|
|a (OCoLC)54116306
|z (OCoLC)326799240
|z (OCoLC)606592204
|z (OCoLC)644443837
|z (OCoLC)729550699
|z (OCoLC)748108415
|z (OCoLC)759519824
|z (OCoLC)809691320
|z (OCoLC)988767626
|z (OCoLC)991285642
|z (OCoLC)993080144
|z (OCoLC)993535504
|z (OCoLC)993699478
|z (OCoLC)999658122
|z (OCoLC)1002008809
|z (OCoLC)1003995623
|z (OCoLC)1019733215
|z (OCoLC)1022753077
|z (OCoLC)1027170642
|z (OCoLC)1029446017
|z (OCoLC)1031318898
|z (OCoLC)1034613201
|z (OCoLC)1037790873
|z (OCoLC)1044220132
|z (OCoLC)1056354658
|z (OCoLC)1060858961
|z (OCoLC)1062958724
|z (OCoLC)1100871439
|z (OCoLC)1103263196
|z (OCoLC)1104446263
|z (OCoLC)1124354522
|z (OCoLC)1129348888
|z (OCoLC)1179124748
|z (OCoLC)1202560981
|z (OCoLC)1240506601
|z (OCoLC)1302274492
|
037 |
|
|
|a FD69B4CD-F384-4732-95E6-D899E5DD6C78
|b OverDrive, Inc.
|n http://www.overdrive.com
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.76.C68
|b G75 2001eb
|
072 |
|
7 |
|a COM
|x 015000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8/4
|2 21
|
084 |
|
|
|a 54.89
|2 bcl
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Grimes, Roger A.
|
245 |
1 |
0 |
|a Malicious mobile code :
|b virus protection for Windows /
|c Roger A. Grimes.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Sebastopol, CA :
|b O'Reilly & Associates,
|c 2001.
|
300 |
|
|
|a 1 online resource (xviii, 522 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
505 |
0 |
0 |
|t Hunt
|g 1 --
|t What Is Malicious Mobile Code?
|g 2 --
|t Malicious Code and the Law
|g 11 --
|t Malicious Code-Writing Subculture
|g 13 --
|t MMC Terminology
|g 20 --
|g 2.
|t DOS Computer Viruses
|g 22 --
|t DOS Technologies
|g 23 --
|t DOS Virus Technologies
|g 32 --
|t Types of DOS Viruses
|g 33 --
|t Virus Defense Mechanisms
|g 43 --
|t Examples of DOS Viruses
|g 48 --
|t Detecting a DOS-Based Computer Virus
|g 50 --
|t Removing a DOS Virus
|g 53 --
|t Protecting Yourself from Viruses
|g 55 --
|g 3.
|t Windows Technologies
|g 59 --
|t Windows Technologies
|g 59 --
|t New Windows Versions
|g 86 --
|g 4.
|t Viruses in a Windows World
|g 93 --
|t DOS Viruses on Windows Platforms
|g 93 --
|t Windows Viruses on Windows Platforms
|g 99 --
|t Signs and Symptoms of Windows NT Virus Infections
|g 102 --
|t Windows Virus Examples
|g 105 --
|t Detecting a Windows Virus
|g 111 --
|t Removing Viruses
|g 118 --
|t Removing Infected Files
|g 121 --
|t Preventing Viruses in Windows
|g 125 --
|t Future
|g 128 --
|g 5.
|t Macro Viruses
|g 130 --
|t What Is a Macro Virus?
|g 131 --
|t Microsoft Word and Excel Macros
|g 135 --
|t Working with Macros
|g 138 --
|t Office 2000 Security
|g 143 --
|t Macro Virus Technologies
|g 147 --
|t Macro Virus Examples
|g 157 --
|t Detecting Macro Viruses
|g 160 --
|t Removing Macro Viruses and Repairing the Damage
|g 166 --
|t Preventing Macro Viruses
|g 173 --
|g 6.
|t Trojans and Worms
|g 180 --
|t Threat
|g 180 --
|t What Are Trojan Horses and Worms?
|g 182 --
|t Signs and Symptoms
|g 184 --
|t Types of Trojans
|g 184 --
|t Trojan Technology
|g 191 --
|t Becoming Familiar with Your PC
|g 194 --
|t Trojan and Worm Examples
|g 199 --
|t Detecting and Removing Trojans and Worms
|g 208 --
|t Preventing Trojans and Worms
|g 221 --
|g 7.
|t Instant Messaging Attacks
|g 226 --
|t Introduction to Instant Messaging
|g 226 --
|t Types of Instant Messaging
|g 228 --
|t Introduction to Internet Relay Chat
|g 230 --
|t Hacking Instant Messaging
|g 235 --
|t Examples of IRC Attacks
|g 242 --
|t Detecting Malicious IM
|g 246 --
|t Removing Malicious IM
|g 247 --
|t Protecting Yourself from IM Attacks
|g 248 --
|g 8.
|t Internet Browser Technologies
|g 251 --
|t Browser Technologies
|g 253 --
|t Web Languages
|g 259 --
|t Other Browser Technologies
|g 266 --
|t When to Worry About Browser Content
|g 274 --
|g 9.
|t Internet Browser Attacks
|g 276 --
|t Browser-Based Exploits
|g 276 --
|t Examples of Attacks and Exploits
|g 277 --
|t Detecting Internet Browser Attacks
|g 293 --
|t Removing and Repairing the Damage
|g 295 --
|t Preventing Internet Browser Attacks
|g 295 --
|g 10.
|t Malicious Java Applets
|g 306 --
|t Java
|g 306 --
|t Java Security
|g 311 --
|t Java Exploits
|g 319 --
|t Example Java Exploits
|g 322 --
|t Detecting Malicious Java Applets
|g 328 --
|t Removing Malicious Java Code
|g 331 --
|t Protecting Yourself from Malicious Java Code
|g 332 --
|g 11.
|t Malicious ActiveX Controls
|g 341 --
|t ActiveX
|g 341 --
|t ActiveX Security
|g 346 --
|t ActiveX Security Criticisms
|g 362 --
|t Malicious ActiveX Examples
|g 365 --
|t Detecting Malicious ActiveX Controls
|g 370 --
|t Removing and Preventing Malicious Active Controls
|g 371 --
|g 12.
|t Email Attacks
|g 383 --
|t Email Programs
|g 384 --
|t Email Exploits
|g 394 --
|t Detecting Email Attacks
|g 398 --
|t Removing Infected Email
|g 399 --
|t Preventing Email Attacks
|g 403 --
|g 13.
|t Hoax Viruses
|g 418 --
|t Mother of All Computer Viruses
|g 418 --
|t Categories of Hoax Messages
|g 422 --
|t Detection
|g 427 --
|t Removing and Preventing Hoax Viruses
|g 432 --
|g 14.
|t Defense
|g 435 --
|t Defense Strategy
|g 435 --
|t Malicious Mobile Code Defense Plan
|g 436 --
|t Use a Good Antivirus Scanner
|g 447 --
|t Antivirus Scanning Locations
|g 455 --
|t Best Steps Toward Securing Any Windows PC
|g 461 --
|t Additional Defense Tools
|g 464 --
|t Antivirus Product Review
|g 471 --
|t Future
|g 475 --
|g 15.
|t Future
|g 477 --
|t Future of Computing
|g 477 --
|t MMC Exploits
|g 483 --
|t Real Defense Solutions
|g 486.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer viruses.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Virus informatiques.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Viruses.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computer viruses
|2 fast
|
650 |
1 |
7 |
|a Computervirussen.
|2 gtt
|
650 |
1 |
7 |
|a Computerbeveiliging.
|2 gtt
|
650 |
|
7 |
|a Virus informatiques.
|2 ram
|
776 |
0 |
8 |
|i Print version:
|a Grimes, Roger A.
|t Malicious mobile code.
|b 1st ed.
|d Sebastopol, CA : O'Reilly & Associates, 2001
|z 156592682X
|w (DLC) 2001033095
|w (OCoLC)46671214
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/156592682X/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1527388
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14536206
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14530487
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32797424
|
938 |
|
|
|a Internet Archive
|b INAR
|n maliciousmobilec00grim
|
994 |
|
|
|a 92
|b IZTAP
|