Computer Viruses For Dummies
, by Gregory, Peter H.Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9780764574184 | 0764574183
- Cover: Paperback
- Copyright: 8/27/2004
Computer viruses just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there' s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. "Computer Viruses For Dummies helps you: Understand the risks and analyze your PC' s current condition Select, install, and configure antivirus software Scan your computer and e-mail Rid your computer of viruses it' s already caught Update antivirus software and install security patches Use firewalls and spyware blockers Protect handheld PDAs from viruses Adopt safe computing practices, especially with e-mail and when you' re surfing the Net Written by Peter H. Gregory, coauthor of "CISSP For Dummies and "Security + For Dummies, "Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best progra
Peter Gregory, CISSP, CISA, has spent 20 years developing technology solutions for those who aren’t technologically oriented. He is an information security strategist for a wireless telecommunications carrier.
Introduction | 1 | (8) | |||
|
1 | (1) | |||
|
2 | (2) | |||
|
2 | (1) | |||
|
2 | (1) | |||
|
3 | (1) | |||
|
3 | (1) | |||
|
4 | (1) | |||
|
4 | (1) | |||
|
4 | (1) | |||
|
4 | (1) | |||
|
5 | (1) | |||
|
6 | (1) | |||
|
7 | (1) | |||
|
8 | (1) | |||
Part I: EValuatinq Your Virus Situation | 9 | (40) | |||
|
11 | (12) | |||
|
12 | (9) | |||
|
12 | (2) | |||
|
14 | (1) | |||
|
15 | (1) | |||
|
15 | (1) | |||
|
16 | (2) | |||
|
18 | (3) | |||
|
21 | (2) | |||
|
23 | (10) | |||
|
24 | (4) | |||
|
24 | (1) | |||
|
25 | (1) | |||
|
25 | (1) | |||
|
26 | (1) | |||
|
26 | (1) | |||
|
27 | (1) | |||
|
28 | (1) | |||
|
29 | (3) | |||
|
30 | (1) | |||
|
30 | (1) | |||
|
30 | (1) | |||
|
31 | (1) | |||
|
31 | (1) | |||
|
31 | (1) | |||
|
32 | (1) | |||
|
32 | (1) | |||
|
33 | (16) | |||
|
34 | (1) | |||
|
35 | (8) | |||
|
35 | (3) | |||
|
38 | (2) | |||
|
40 | (1) | |||
|
41 | (2) | |||
|
43 | (1) | |||
|
44 | (7) | |||
|
44 | (2) | |||
|
46 | (1) | |||
|
47 | (1) | |||
|
47 | (2) | |||
Part II: Deploying Your Antivirus Defenses | 49 | (66) | |||
|
51 | (24) | |||
|
51 | (2) | |||
|
53 | (7) | |||
|
53 | (1) | |||
|
54 | (1) | |||
|
55 | (1) | |||
|
55 | (1) | |||
|
56 | (1) | |||
|
57 | (3) | |||
|
60 | (4) | |||
|
60 | (1) | |||
|
61 | (2) | |||
|
63 | (1) | |||
|
64 | (3) | |||
|
65 | (1) | |||
|
65 | (2) | |||
|
67 | (8) | |||
|
69 | (3) | |||
|
72 | (3) | |||
|
75 | (12) | |||
|
76 | (2) | |||
|
76 | (1) | |||
|
76 | (1) | |||
|
77 | (1) | |||
|
78 | (1) | |||
|
79 | (3) | |||
|
79 | (1) | |||
|
80 | (1) | |||
|
81 | (1) | |||
|
82 | (3) | |||
|
83 | (1) | |||
|
83 | (2) | |||
|
85 | (1) | |||
|
86 | (1) | |||
|
86 | (1) | |||
|
87 | (12) | |||
|
87 | (2) | |||
|
89 | (4) | |||
|
90 | (1) | |||
|
91 | (1) | |||
|
92 | (1) | |||
|
93 | (1) | |||
|
93 | (2) | |||
|
95 | (4) | |||
|
97 | (1) | |||
|
97 | (2) | |||
|
99 | (16) | |||
|
99 | (5) | |||
|
100 | (1) | |||
|
101 | (2) | |||
|
103 | (1) | |||
|
104 | (1) | |||
|
105 | (12) | |||
|
105 | (1) | |||
|
106 | (9) | |||
Part III: Maintaining Your Vigilance | 115 | (92) | |||
|
117 | (10) | |||
|
117 | (5) | |||
|
118 | (1) | |||
|
118 | (1) | |||
|
118 | (1) | |||
|
119 | (1) | |||
|
119 | (3) | |||
|
122 | (1) | |||
|
123 | (2) | |||
|
123 | (1) | |||
|
124 | (1) | |||
|
125 | (2) | |||
|
127 | (26) | |||
|
127 | (4) | |||
|
128 | (1) | |||
|
129 | (1) | |||
|
130 | (1) | |||
|
131 | (2) | |||
|
133 | (1) | |||
|
134 | (14) | |||
|
134 | (5) | |||
|
139 | (2) | |||
|
141 | (3) | |||
|
144 | (1) | |||
|
145 | (2) | |||
|
147 | (1) | |||
|
148 | (2) | |||
|
150 | (3) | |||
|
153 | (28) | |||
|
154 | (11) | |||
|
154 | (2) | |||
|
156 | (6) | |||
|
162 | (3) | |||
|
165 | (16) | |||
|
166 | (1) | |||
|
167 | (14) | |||
|
181 | (8) | |||
|
182 | (1) | |||
|
182 | (2) | |||
|
183 | (1) | |||
|
183 | (1) | |||
|
183 | (1) | |||
|
184 | (1) | |||
|
184 | (4) | |||
|
185 | (1) | |||
|
185 | (1) | |||
|
186 | (1) | |||
|
186 | (1) | |||
|
187 | (1) | |||
|
187 | (1) | |||
|
188 | (1) | |||
|
189 | (18) | |||
|
190 | (6) | |||
|
190 | (1) | |||
|
191 | (1) | |||
|
192 | (1) | |||
|
193 | (1) | |||
|
194 | (1) | |||
|
195 | (1) | |||
|
196 | (1) | |||
|
197 | (1) | |||
|
197 | (4) | |||
|
198 | (1) | |||
|
199 | (2) | |||
|
201 | (1) | |||
|
202 | (1) | |||
|
202 | (1) | |||
|
203 | (1) | |||
|
203 | (1) | |||
|
203 | (1) | |||
|
204 | (5) | |||
|
204 | (1) | |||
|
205 | (1) | |||
|
205 | (2) | |||
Part IV Looking at Viruses under the Microscope | 207 | (40) | |||
|
209 | (12) | |||
|
209 | (4) | |||
|
210 | (2) | |||
|
212 | (1) | |||
|
213 | (1) | |||
|
214 | (3) | |||
|
214 | (1) | |||
|
214 | (3) | |||
|
217 | (2) | |||
|
217 | (1) | |||
|
218 | (1) | |||
|
219 | (2) | |||
|
221 | (14) | |||
|
222 | (5) | |||
|
222 | (2) | |||
|
224 | (3) | |||
|
227 | (1) | |||
|
228 | (2) | |||
|
229 | (1) | |||
|
229 | (1) | |||
|
230 | (2) | |||
|
232 | (1) | |||
|
233 | (2) | |||
|
235 | (12) | |||
|
235 | (3) | |||
|
236 | (1) | |||
|
237 | (1) | |||
|
237 | (1) | |||
|
238 | (1) | |||
|
238 | (11) | |||
|
238 | (1) | |||
|
239 | (1) | |||
239 | (1) | ||||
|
240 | (1) | |||
|
241 | (1) | |||
|
242 | (1) | |||
|
243 | (1) | |||
|
244 | (1) | |||
|
244 | (3) | |||
Part V: The Part at Tens | 247 | (18) | |||
|
249 | (6) | |||
|
249 | (1) | |||
|
250 | (1) | |||
|
251 | (1) | |||
|
251 | (1) | |||
|
252 | (1) | |||
|
252 | (1) | |||
|
252 | (1) | |||
|
253 | (1) | |||
|
253 | (1) | |||
|
254 | (1) | |||
|
255 | (10) | |||
|
256 | (1) | |||
|
257 | (1) | |||
|
258 | (1) | |||
|
258 | (1) | |||
|
259 | (1) | |||
|
260 | (1) | |||
|
261 | (1) | |||
|
261 | (1) | |||
|
262 | (1) | |||
|
263 | (1) | |||
|
264 | (1) | |||
Index | 265 |
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.