A pathology of computer viruses:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London ; Berlin ; Heidelberg ; New York ; Paris ; Tokyo ; Hong Kong ; Barcelona ; Budapest
Springer
1992
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIII, 299 S. graph. Darst. |
ISBN: | 3540196102 0387196102 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV025859711 | ||
003 | DE-604 | ||
007 | t | ||
008 | 100417s1992 d||| |||| 00||| eng d | ||
016 | 7 | |a 920365310 |2 DE-101 | |
020 | |a 3540196102 |9 3-540-19610-2 | ||
020 | |a 0387196102 |9 0-387-19610-2 | ||
035 | |a (OCoLC)246670778 | ||
035 | |a (DE-599)BVBBV025859711 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Ferbrache, David |e Verfasser |4 aut | |
245 | 1 | 0 | |a A pathology of computer viruses |c David Ferbrache |
264 | 1 | |a London ; Berlin ; Heidelberg ; New York ; Paris ; Tokyo ; Hong Kong ; Barcelona ; Budapest |b Springer |c 1992 | |
300 | |a XIII, 299 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computervirus |0 (DE-588)4214774-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computervirus |0 (DE-588)4214774-8 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019107451&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-019107451 |
Datensatz im Suchindex
_version_ | 1812437799908933632 |
---|---|
adam_text |
CONTENTS
1 INTRODUCTION. 1
1.1 PREAMBLE. 1
1.2 WHAT IS A COMPUTER VIRUS?. 1
1.3 WORMS: NETWORKED VIRUSES. 2
1.4 TERMINOLOGY. 3
2 HISTORICAL PERSPECTIVES. 5
2.1 INTRODUCTION. 5
2.2 1960S: EARLY RABBITS. 5
2.3 1970S: FICTION AND THE WORM. 6
2.4 1980-1983: GENESIS. 8
2.5 1984-1986: EXODUS. 10
2.6 1987: MAC, ATARI AND AMIGA NEXT. 12
2.7 1988: PROLIFERATION AND DISBELIEF. 14
2.7.1 JANUARY-MARCH. 14
2.7.2 APRIL-SEPTEMBER. 15
2.7.3 OCTOBER-DECEMBER. 16
2.8 1989: REACTION BY THE COMMUNITY. 19
2.8.1 JANUARY-MARCH. 19
2.8.2 APRIL-JUNE. 20
2.8.3 JULY-SEPTEMBER. 22
2.8.4 OCTOBER-DECEMBER. 24
2.9 1990: ORGANISATION AND LITIGATION. 27
2.9.1 JANUARY-APRIL. 27
2.9.2 MAY-SEPTEMBER. 28
2.9.3 OCTOBER-DECEMBER. 29
2.10 SUMMARY. 30
3 THEORY OF VIRUSES. 31
3.1 INTRODUCTION. 31
3.2 ADDITION OF VIRAL CODE. 31
3.3 DETECTION OF VIRUSES. 35
3.4 CLASSES OF VIRUSES. 36
3.5 THOMPSON: AND TRUSTING TRUST. 38
BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/920365310
A PATHOLOGY OF COMPUTER VIRUSES
VIII
3.6 BIOLOGICAL ANALOGIES. 42
3.6.1 BIOLOGICAL VIRUSES. 43
3.6.2 PARALLELS BETWEEN LOW LEVEL OPERATION. 44
3.6.3 HIGH LEVEL PARALLELS. 45
3.7 QUEST FOR LIFE. 46
3.8 EVOLUTION: GENETIC ALGORITHMS. 48
3.8.1 RANDOM MUTATION. 48
3.8.2 PROGRAMMED MUTATION. 48
3.8.3 GENETIC ALGORITHMS. 50
3.8.4 GROWTH AND DEATH. 51
4 OPERATION OF PC VIRUSES. 55
4.1 INTRODUCTION. 55
4.2 PC BOOT SEQUENCE: INITIALISATION. 56
4.3 BIOS AND DOS. 56
4.4 MASTER BOOT RECORD. 57
4.5 DOS BOOT SECTOR. 58
4.6 SYSTEM INITIALISATION. 59
4.7 BATCH PROCESSING VIRUSES. 60
4.8 COM AND EXE VIRUSES. 61
4.8.1 NON-OVERWRITING PREPENDING COM INFECTORS . 62
4.8.2 OVERWRITING COM INFECTORS. 63
4.8.3 NON-OVERWRITING APPENDING COM INFECTORS. 63
4.8.4 EXE VIRUSES. 64
4.9 RESIDENT AND TRANSIENT VIRUSES. 65
4.10 MANIPULATION BY VIRAL CODE. 69
4.11 ACTIVATION CRITERIA. 70
4.12 CAMOUFLAGE. 73
4.12.1 CONCEALMENT IN INFECTED FILES. 74
4.12.2 ENCRYPTION OF VIRAL CODE. 74
4.12.3 HIDING OF VIRAL CODE. 77
4.12.4 CHECKSUM CALCULATION. 78
4.12.5 PREVENTION OF ALTERATION DETECTION. 78
4.12.6 CONCEALMENT OF VIRAL CODE IN MEMORY. 79
4.12.7 CONCEALMENT OF VIRAL ACTIVITY. 80
4.12.8 CONCEALING DISK ACTIVITY. 82
4.12.9 CONCEALING SYSTEM SLOWDOWN. 82
4.13 REPLICATION. 83
4.13.1 LOCATING A HOST. 83
4.13.2 SIGNATURES. 84
4.13.3 MISCELLANEOUS TOPICS. 86
4.13.3.1 CORRESPONDING FILE VIRUS. 86
4.13.3.2 SYS VIRUS. 87
4.13.3.3 MULTI-VECTOR VIRUSES. 87
4.13.3.4 MULTI-ARCHITECTURE VIRUSES. 87
4.13.3.5 ARCHITECTURE DEPENDENT VIRUSES. 88
CONTENTS *
X
5
MANAGEMENT OF PC VIRUSES. 91
5.1 PERSPECTIVE ON SECURITY. 91
5.2 COMPONENTS OF A VIRUS CONTROL SCHEME. 91
5.3 PREVENTION OF VIRUS ATTACK. 92
5.3.1 PHYSICAL ACCESS CONSTRAINTS. 93
5.3.2 ELECTRONIC MEASURES. 94
5.3.2.1 PHYSICAL FEATURE VERIFICATION. 95
5.3.2.2 KNOWLEDGE VERIFICATION. 95
5.3.2.2.1 PASSWORDS. 96
5.3.2.2.2 BACKGROUND VERIFICATION. 97
5.3.2.2.3 OTHER TECHNIQUES. 97
5.3.2.3 POSSESSION VERIFICATION. 97
5.3.3 MEDIA ACCESS CONTROLS. 97
5.3.4 NETWORK ACCESS CONTROLS. 98
5.3.4.1 IDENTIFICATION OF ACCESS CONTROLS. 99
5.3.4.1.1 CENTRALISED NETWORK FILE SERVERS. 99
5.3.4.1.2 DISTRIBUTED TRUST. 100
5.3.4.1.3 NETWORK TRANSPORT BY PUBLIC CARRIER
OR ACCESSIBLE MEDIA. 100
5.3.5 IDEOLOGICAL CONTROLS. 101
5.3.5.1 USER EDUCATION. 101
5.3.6 MANAGEMENT POLICIES. 105
5.3.6.1 TRAINING OF EMPLOYEES. 105
5.3.6.2 USE OF ANTI-VIRAL MEASURES. 105
5.3.6.3 COMPARTMENTALISATION. 107
5.3.6.4 CENTRALISATION. 107
5.3.6.5 PERSONNEL POLICIES. 108
5.3.7 VACCINATION AND INOCULATION. 108
5.4 DETECTION OF VIRAL CODE. 109
5.4.1 MONITORING AND LOGGING. 109
5.4.2 SIGNATURE RECOGNITION. 112
5.4.3 GENERIC CODE RECOGNITION. 112
5.4.4 SACRIFICIAL LAMB. 114
5.4.5 AUDITING. 115
5.4.6 USE OF EXPERT SYSTEMS TO ANALYSE VIRAL
BEHAVIOUR. 116
5.4.7 FIGHTING FIRE WITH FIRE. 117
5.5 CONTAINMENT OF VIRAL CODE. 118
5.5.1 HARDWARE COMPARTMENTALISATION. 119
5.5.1.1 VIRTUAL MACHINE. 119
5.5.1.1.180386 TASK SWITCHING SUPPORT. 120
5.5.1.1.2 80386 PAGED SEGMENTED MEMORY. 120
5.5.1.1.3 ACCESSING OS CODE. 124
5.5.1.1.4 SEGMENT PERMISSIONS. 125
5.5.1.1.5 PAGED MEMORY OPERATION. 126
A PATHOLOGY OF COMPUTER VIRUSES
5.5.1.1.6 INPUT/OUTPUT OPERATIONS. 127
5.5.1.1.7 VIRTUAL MACHINE IN SOFTWARE. 128
5.5.1.2 AUTOMATIC FLOW VERIFICATION. 129
5.5.1.3 SOFTWARE DISTRIBUTION: ENSURING TRUST. 130
5.5.2 SOFTWARE COMPARTMENTALISATION. 130
5.5.2.1 INTERRUPT TRAPPING CODE. 130
5.5.2.1.1 CONFIGURABLE MONITORS. 131
5.5.2.1.2 OPERATION OF A MONITOR. 133
5.5.2.1.3 EXTENSIONS TO REAL TIME MONITORING . 135
5.5.2.2 OS SUPPORT. 135
5.5.3 NETWORK COMPARTMENTALISATION. 135
5.5.4 INVESTIGATION AND RESPONSE. 136
5.5.4.1 WHAT IS THE INFECTION?. 136
5.5.4.1.1 ACQUISITION. 137
5.5.4.1.2 LOGGING OF RELEVANT INFORMATION . 138
5.5.4.1.3 DISASSEMBLY. 138
5.5.4.2 DISSEMINATION OF INFORMATION. 140
5.5.4.3 GENERAL CONTAINMENT. 141
5.5.4.4 TRACING OF INFECTION SOURCE. 142
5.5.5 DISINFECTION OF VIRAL CODE. 144
5.5.5.1 RE-INSTALLATION. 144
5.5.5.2 RECOMPILATION FROM SOURCE. 145
5.5.6 CHECKING FOR RE-INFECTION. 145
5.5.7 DISINFECTION UTILITIES. 146
5.6 RECOVERY FROM VIRAL INFECTION. 147
5.6.1 BACKUP PROCEDURES . 147
5.7 CONTINGENCY PLANNING. 148
5.7.1 REDUNDANCY. 149
5.7.2 INSURANCE. 149
5.7.3 PUBLIC RELATIONS. 149
5.8 REMEDIAL ACTION. 150
6 APPLE MACINTOSH VIRUSES. 153
6.1 INTRODUCTION. 153
6.2 MACINTOSH: THE ABSTRACT OPERATING SYSTEM. 154
6.2.1 INITIALISATION. 156
6.2.2 RESOURCES. 158
6.2.3 TRAP DISPATCH TABLE STRUCTURE. 161
6.2.4 NON-LINK VIRUSES. 162
6.2.5 LINK VIRUSES. 162
6.2.6 NOTES ON KEYBOARD SEQUENCES. 165
6.2.7 SUMMARY OF MAC PROTECTION. 165
7 MAINFRAME SYSTEMS: THE GROWING THREAT. 167
7.1 INTRODUCTION. 167
7.2 HARDWARE ARCHITECTURES. 167
CONTENTS XI
7.3 SOFTWARE ARCHITECTURE. 168
7.3.1 DISCRETIONARY ACCESS CONTROLS. 168
7.3.2 INTEGRITY VERSUS CONFIDENTIALITY. 172
7.3.3 MANDATORY ACCESS CONTROLS. 173
7.3.4 COMMENTARY ON SECURITY STANDARDISATION. 177
7.4 UNIX: A VIRAL RISK ASSESSMENT. 180
7.4.1 SYSTEM STARTUP. 180
7.4.2 LOGIN AND USER COMMANDS. 183
7.4.3 BUGS AND LOOPHOLES. 184
7.4.4 MECHANICS OF UNIX VIRUSES. 185
7.4.4.1 BATCH VIRUSES. 185
7.4.4.2 LINK VIRUSES. 186
7.4.4.3 DYNAMIC LOADING. 186
7.4.4.4 OTHER CONSIDERATIONS. 186
7.4.4.5 PROTECTING AGAINST UNIX VIRUSES. 189
7.4.4.6 COHEN: EARLY UNIX VIRUSES. 190
8 NETWORK VIRUSES: THE WORMS. 193
8.1 INTRODUCTION. 193
8.2 STANDARDISATION. 194
8.3 HISTORY OF NETWORK PESTS. 195
8.3.1 EARLY WORK: PRE-1980. 195
8.3.2 RECENT BENIGN AND MALICIOUS WORMS. 196
8.3.3 CHRISTMA EXEC CHAIN LETTER. 197
8.3.4 CHAIN LETTERS ON UNIX. 199
8.4 INTERNET PROTOCOLS. 199
8.4.1 ARCHITECTURE. 200
8.4.2 PEER AUTHENTICATION. 201
8.4.3 ACCESS CONTROLS. 202
8.4.4 DATA STREAM INTEGRITY. 202
8.4.5 DAEMONS AND SERVERS. 203
8.4.6 DISTRIBUTED TRUST. 203
8.4.7 TRUSTED PORTS. 205
8.4.8 PROBLEMS AND SOLUTIONS. 205
8.4.9 INTERNET WORM: BLACK THURSDAY - 3 NOVEMBER
1988. 205
8.4.9.1 INTERNALS. 206
8.4.9.2 ACTION AND REACTION. 208
8.4.9.3 THE AFTERMATH. 211
8.4.10 DISNET: A CHILD OF THE INTERNET. 213
8.5 OSI: SECURITY IN THE MAKING. 214
8.6 DECNET: INSECURITY THROUGH DEFAULT. 215
8.6.1 HI.COM: THE CHRISTMAS WORM. 216
8.6.1.1 REACTION OF THE DECNET COMMUNITY. 217
8.6.1.2 WORMS AGAINST NUCLEAR KILLERS. 218
A PATHOLOGY OF COMPUTER VIRUSES
XII
9 REACTIONS OF THE IT COMMUNITY. 221
9.1 DISCUSSION AND ADVICE. 221
9.1.1 BULLETIN BOARD AND CASUAL USERS. 221
9.1.2 ACADEMIC ESTABLISHMENTS. 222
9.1.2.1 CREN/CSNET. 223
9.1.2.2 NSFNET. 223
9.1.2.3 HEPNET/SPAN. 224
9.1.2.4 GENERAL COMMUNITY RESPONSES. 225
9.1.3 GOVERNMENT RESEARCH ORGANISATIONS. 226
9.1.4 MILITARY ORGANISATIONS. 227
9.1.5 COMMERCIAL ORGANISATIONS. 227
9.1.6 CRIMINAL INVESTIGATION ORGANISATIONS. 227
9.1.7 PROFESSIONAL ORGANISATIONS. 227
9.2 LEGISLATIVE ISSUES. 229
9.2.1 SCOTTISH LAW COMMISSION. 230
9.2.2 ENGLISH LAW COMMISSION. 231
9.2.3 COMPUTER MISUSE ACT. 233
9.2.4 SUMMARY OF LEGISLATION. 234
9.3 PROFESSIONALISM AND SOFTWARE DEVELOPMENT. 235
10 CONCLUSIONS: THE FUTURE AHEAD. 237
APPENDICES. 239
1 DOS FILESTORE STRUCTURE. 239
1.1 INTRODUCTION. 239
1.2 MASTER BOOT RECORD. 239
1.3 DOS BOOT SECTOR. 240
1.4 FILE ALLOCATION TABLE. 241
1.5 ROOT DIRECTORY. 242
2 LOW LEVEL DISK LAYOUT. 245
3 EXE FILE FORMAT. 249
4 MAC FILESTORE STRUCTURE. 251
5 PC VIRUS RELATIONSHIP CHART. 253
6 MACINTOSH VIRUS RELATIONSHIP CHART. 255
7 PC BOOT SEQUENCE. 257
8 AIDS TROJAN: ACCOMPANYING LICENCE. 259
9 SOFTWARE INFECTED AT SOURCE. 263
CONTENTS
XIII
10 NOMENCLATURE. 265
10.1 TYPES OF VIRUS. 265
10.1.1 MASTER BOOT SECTOR VIRUSES. 265
10.1.2 DOS BOOT SECTOR VIRUSES. 265
10.1.3 EXECUTABLE COM/EXE VIRUSES. 265
10.1.4 MEMORY RESIDENT VIRUSES. 266
10.1.5 OVERWRITING VIRUSES. 266
10.1.6 PREPENDING VIRUSES. 266
10.1.7 APPENDING VIRUSES. 266
10.2 GENERATIONS OF VIRUS. 266
10.3 CLASSES OF ANTI-VIRUS PRODUCT. 267
11 UNIX BOOT SEQUENCE. 269
12 CERT PRESS RELEASE. 271
13 CERT/CIAC ADVISORIES. 273
14 CONTACT POINTS. 277
15 ABBREVIATIONS. 279
16 FURTHER READING. 283
17 VIRUS-1 ARCHIVE SITES. 291
18 RELATIVE FREQUENCIES OF IBM VIRUSES. 293
SUBJECT INDEX
295 |
any_adam_object | 1 |
author | Ferbrache, David |
author_facet | Ferbrache, David |
author_role | aut |
author_sort | Ferbrache, David |
author_variant | d f df |
building | Verbundindex |
bvnumber | BV025859711 |
classification_rvk | ST 273 ST 276 |
ctrlnum | (OCoLC)246670778 (DE-599)BVBBV025859711 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV025859711</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100417s1992 d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">920365310</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540196102</subfield><subfield code="9">3-540-19610-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387196102</subfield><subfield code="9">0-387-19610-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)246670778</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV025859711</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ferbrache, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A pathology of computer viruses</subfield><subfield code="c">David Ferbrache</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ; Berlin ; Heidelberg ; New York ; Paris ; Tokyo ; Hong Kong ; Barcelona ; Budapest</subfield><subfield code="b">Springer</subfield><subfield code="c">1992</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 299 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019107451&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-019107451</subfield></datafield></record></collection> |
id | DE-604.BV025859711 |
illustrated | Illustrated |
indexdate | 2024-10-09T12:02:58Z |
institution | BVB |
isbn | 3540196102 0387196102 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-019107451 |
oclc_num | 246670778 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | XIII, 299 S. graph. Darst. |
publishDate | 1992 |
publishDateSearch | 1992 |
publishDateSort | 1992 |
publisher | Springer |
record_format | marc |
spelling | Ferbrache, David Verfasser aut A pathology of computer viruses David Ferbrache London ; Berlin ; Heidelberg ; New York ; Paris ; Tokyo ; Hong Kong ; Barcelona ; Budapest Springer 1992 XIII, 299 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computervirus (DE-588)4214774-8 gnd rswk-swf Computervirus (DE-588)4214774-8 s DE-604 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019107451&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Ferbrache, David A pathology of computer viruses Computervirus (DE-588)4214774-8 gnd |
subject_GND | (DE-588)4214774-8 |
title | A pathology of computer viruses |
title_auth | A pathology of computer viruses |
title_exact_search | A pathology of computer viruses |
title_full | A pathology of computer viruses David Ferbrache |
title_fullStr | A pathology of computer viruses David Ferbrache |
title_full_unstemmed | A pathology of computer viruses David Ferbrache |
title_short | A pathology of computer viruses |
title_sort | a pathology of computer viruses |
topic | Computervirus (DE-588)4214774-8 gnd |
topic_facet | Computervirus |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019107451&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ferbrachedavid apathologyofcomputerviruses |