Computer viruses and malware:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer
2006
|
Schriftenreihe: | Advances in information security
22 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XVI, 227 S. Ill., graph. Darst. |
ISBN: | 0387302360 0387341889 9780387302362 9780387341880 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV022182860 | ||
003 | DE-604 | ||
005 | 20070124 | ||
007 | t | ||
008 | 060921s2006 ad|| |||| 00||| eng d | ||
020 | |a 0387302360 |9 0-387-30236-0 | ||
020 | |a 0387341889 |9 0-387-34188-9 | ||
020 | |a 9780387302362 |9 978-0-387-30236-2 | ||
020 | |a 9780387341880 |9 978-0-387-34188-0 | ||
035 | |a (OCoLC)254904470 | ||
035 | |a (DE-599)BVBBV022182860 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-384 |a DE-11 |a DE-634 | ||
050 | 0 | |a QA76.76.C68 | |
082 | 0 | |a 005.84 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Aycock, John |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer viruses and malware |c by John Aycock |
264 | 1 | |a New York, NY |b Springer |c 2006 | |
300 | |a XVI, 227 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v 22 | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer viruses | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computervirus |0 (DE-588)4214774-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computervirus |0 (DE-588)4214774-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 2 | |5 DE-604 | |
830 | 0 | |a Advances in information security |v 22 |w (DE-604)BV014168308 |9 22 | |
856 | 4 | 2 | |a text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=2739448&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m Digitalisierung UB Augsburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015397621&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015397621 |
Datensatz im Suchindex
_version_ | 1804136158359191552 |
---|---|
adam_text | Contents
Dedication
List of Figures
Preface
1.
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
2.
11
12
12
13
14
15
16
16
17
17
18
19
2.1
2.1
.1
Logic
2.1
.2-
Trojan Horse
2.1
.3
Back Door
2.1.4
Virus
2.1
.5
Worm
2.1
.6
Rabbit
2.1
.7
Spyware
2.1
.8
Adware
2.1
.9
Hybrids, Droppers, and Blended Threats
2.1
.10
Zombies
2.2
2.3
Authorship
2.4
Timeline
3.
3.1
Classification by Target
3.1.1
3.1.2
3.1.3
3.2
Classification by Concealment Strategy
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5
3.2.6
3.2.7
3.3
Virus Kits
viii
21
22
27
28
28
30
33
34
34
35
37
38
38
46
47
48
4.
4.1
4.1.1
4.1.2
4.1.3
4.2
4.2.1
4.2.2
4.3
4.4
4.4.1
4.4.2
4.4.3
4.5
4.6
4.6.1
4.6.2
4.6.3
Contents
5.
5.1
5.2
5.3
5.3.1
5.3.2
5.3.3
5.4
5.4.1
5.4.2
5.5
5.6
5.7
109
109
110
113
123
125
127
132
134
136
143
144
7.1.1
7.1.2
7.2
7.2.1
7.2.2
8.
8.1
8.1.1
8.1.2
8.1.3
8.2
6.
6.1
Technical Weaknesses
6.
1.1
Background
6.
1.2
Buffer Overflows
6.
1.3
Integer Overflows
6.
.1.4
Format String Vulnerabilities
6.
1.5
Defenses
6.
.1.6
Finding Weaknesses
6.2
Human Weaknesses
6.
.2.1
Virus Hoaxes
7.
7.1
Worm
History
x COMPUTER
8.2.1
8.2.2 Reverse Firewalls 169
8.2.3
8.3 Automatic Countermeasures 172
9. APPLICATIONS 177
9.1
9.2 Spam 178
9.3 Access-for-Sale
9.4 Cryptovirology 181
9.5 Information Warfare 182
9.6 Cyberterrorism 185
10.
10.1 Malware
10.1.1
10.1.2
10.2
10.2.1
10.2.2
10.2.3
10.2.4
10.2.5
11.
References
Index
|
adam_txt |
Contents
Dedication
List of Figures
Preface
1.
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
2.
11
12
12
13
14
15
16
16
17
17
18
19
2.1
2.1
.1
Logic
2.1
.2-
Trojan Horse
2.1
.3
Back Door
2.1.4
Virus
2.1
.5
Worm
2.1
.6
Rabbit
2.1
.7
Spyware
2.1
.8
Adware
2.1
.9
Hybrids, Droppers, and Blended Threats
2.1
.10
Zombies
2.2
2.3
Authorship
2.4
Timeline
3.
3.1
Classification by Target
3.1.1
3.1.2
3.1.3
3.2
Classification by Concealment Strategy
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5
3.2.6
3.2.7
3.3
Virus Kits
viii
21
22
27
28
28
30
33
34
34
35
37
38
38
46
47
48
4.
4.1
4.1.1
4.1.2
4.1.3
4.2
4.2.1
4.2.2
4.3
4.4
4.4.1
4.4.2
4.4.3
4.5
4.6
4.6.1
4.6.2
4.6.3
Contents
5.
5.1
5.2
5.3
5.3.1
5.3.2
5.3.3
5.4
5.4.1
5.4.2
5.5
5.6
5.7
109
109
110
113
123
125
127
132
134
136
143
144
7.1.1
7.1.2
7.2
7.2.1
7.2.2
8.
8.1
8.1.1
8.1.2
8.1.3
8.2
6.
6.1
Technical Weaknesses
6.
1.1
Background
6.
1.2
Buffer Overflows
6.
1.3
Integer Overflows
6.
.1.4
Format String Vulnerabilities
6.
1.5
Defenses
6.
.1.6
Finding Weaknesses
6.2
Human Weaknesses
6.
.2.1
Virus Hoaxes
7.
7.1
Worm
History
x COMPUTER
8.2.1
8.2.2 Reverse Firewalls 169
8.2.3
8.3 Automatic Countermeasures 172
9. "APPLICATIONS" 177
9.1
9.2 Spam 178
9.3 Access-for-Sale
9.4 Cryptovirology 181
9.5 Information Warfare 182
9.6 Cyberterrorism 185
10.
10.1 Malware
10.1.1
10.1.2
10.2
10.2.1
10.2.2
10.2.3
10.2.4
10.2.5
11.
References
Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Aycock, John |
author_facet | Aycock, John |
author_role | aut |
author_sort | Aycock, John |
author_variant | j a ja |
building | Verbundindex |
bvnumber | BV022182860 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.C68 |
callnumber-search | QA76.76.C68 |
callnumber-sort | QA 276.76 C68 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 ST 277 |
ctrlnum | (OCoLC)254904470 (DE-599)BVBBV022182860 |
dewey-full | 005.84 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.84 |
dewey-search | 005.84 |
dewey-sort | 15.84 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02002nam a2200517zcb4500</leader><controlfield tag="001">BV022182860</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070124 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060921s2006 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387302360</subfield><subfield code="9">0-387-30236-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387341889</subfield><subfield code="9">0-387-34188-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387302362</subfield><subfield code="9">978-0-387-30236-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387341880</subfield><subfield code="9">978-0-387-34188-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)254904470</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022182860</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.76.C68</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.84</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Aycock, John</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer viruses and malware</subfield><subfield code="c">by John Aycock</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 227 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">22</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">22</subfield><subfield code="w">(DE-604)BV014168308</subfield><subfield code="9">22</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="a">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=2739448&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Augsburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015397621&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015397621</subfield></datafield></record></collection> |
id | DE-604.BV022182860 |
illustrated | Illustrated |
index_date | 2024-07-02T16:20:39Z |
indexdate | 2024-07-09T20:51:57Z |
institution | BVB |
isbn | 0387302360 0387341889 9780387302362 9780387341880 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015397621 |
oclc_num | 254904470 |
open_access_boolean | |
owner | DE-706 DE-384 DE-11 DE-634 |
owner_facet | DE-706 DE-384 DE-11 DE-634 |
physical | XVI, 227 S. Ill., graph. Darst. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Springer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Aycock, John Verfasser aut Computer viruses and malware by John Aycock New York, NY Springer 2006 XVI, 227 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Advances in information security 22 Computer networks Security measures Computer viruses Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computervirus (DE-588)4214774-8 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Computervirus (DE-588)4214774-8 s DE-604 Computersicherheit (DE-588)4274324-2 s Malware (DE-588)4687059-3 s Advances in information security 22 (DE-604)BV014168308 22 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=2739448&prov=M&dok_var=1&dok_ext=htm Inhaltstext Digitalisierung UB Augsburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015397621&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Aycock, John Computer viruses and malware Advances in information security Computer networks Security measures Computer viruses Computersicherheit (DE-588)4274324-2 gnd Computervirus (DE-588)4214774-8 gnd Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4214774-8 (DE-588)4687059-3 |
title | Computer viruses and malware |
title_auth | Computer viruses and malware |
title_exact_search | Computer viruses and malware |
title_exact_search_txtP | Computer viruses and malware |
title_full | Computer viruses and malware by John Aycock |
title_fullStr | Computer viruses and malware by John Aycock |
title_full_unstemmed | Computer viruses and malware by John Aycock |
title_short | Computer viruses and malware |
title_sort | computer viruses and malware |
topic | Computer networks Security measures Computer viruses Computersicherheit (DE-588)4274324-2 gnd Computervirus (DE-588)4214774-8 gnd Malware (DE-588)4687059-3 gnd |
topic_facet | Computer networks Security measures Computer viruses Computersicherheit Computervirus Malware |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=2739448&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015397621&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014168308 |
work_keys_str_mv | AT aycockjohn computervirusesandmalware |