
Anti-Virus Tools and Techniques for Computer
- 1st Edition - January 1, 1995
- Imprint: William Andrew
- Authors: W. Timothy Polk, Lawrence E. Basham, John P. Wack, Lisa J. Carnahan
- Language: English
- Hardback ISBN:9 7 8 - 0 - 8 1 5 5 - 1 3 6 4 - 3
- Paperback ISBN:9 7 8 - 1 - 4 5 5 7 - 2 9 1 4 - 2
- eBook ISBN:9 7 8 - 1 - 4 3 7 7 - 2 8 2 1 - 7
Anti-Virus Tools & Techniques… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteAnti-Virus Tools & Techniques for Computer
Part I Guide to the Selection of Anti-Virus Tools and Techniques1. Introduction1.1 Audience and Scope1.2 How to Use This Document1.3 Definitions and Basic Concepts2. Functionality2.1 Detection Tools2.2 Identification Tools2.3 Removal Tools3. Selection Factors3.1 Accuracy3.2 Ease of Use3.3 Administrative Overhead3.4 System Overhead4. Tools and Techniques4.1 Signature Scanning and Algorithmic Detection4.2 General Purpose Monitors4.3 Access Control Shells4.4 Checksums for Change Detection4.5 Knowledge-Based Virus Removal Tools4.6 Research Efforts4.7 Other Tools5. Selecting Anti-Virus Techniques5.1 Selecting Detection Tools5.2 Identification Tools5.3 Removal Tools5.4 Example Applications of Anti-Virus Tools6. Selecting the Right Tool6.1 Selecting a Scanner6.2 Selecting a General Purpose Monitor6.3 Selecting an Access Control Shell6.4 Selecting a Change Detector6.5 Selecting an Identification Tool6.6 Selecting a Removal Tool7. For Additional InformationReferencesPart II Computer Viruses and Related Threats: A Management GuideExecutive Summary1. Introduction1.1 Audience and Scope1.2 How to Use This Guide2. A Brief Overview on Viruses and Related Threats2.1 Trojan Horses2.2 Computer Viruses2.3 Network Worms2.4 Other Related Software Threats2.5 The Threat of Unauthorized Use3. Virus Prevention in General3.1 User Education3.2 Software Management3.3 Technical Controls3.4 General Monitoring3.5 Contingency Planning4. Virus Prevention for Multiuser Computers and Associated Networks4.1 General Policies4.2 Software Management4.3 Technical Controls4.4 Monitoring4.5 Contingency Planning4.6 Associated Network Concerns5. Virus Prevention for Personal Computers and Associated Networks5.1 General Policies5.2 Software Management5.3 Technical Controls5.4 Monitoring5.5 Contingency Planning5.6 Associated Network ConcernsAppendix A—ReferencesAppendix B—Suggested Reading
- Edition: 1
- Published: January 1, 1995
- Imprint: William Andrew
- Language: English
- Hardback ISBN: 9780815513643
- Paperback ISBN: 9781455729142
- eBook ISBN: 9781437728217