Browse Results What Format Should I Choose?

Showing 1 through 3 of 3 results

Malicious Mobile Code

by Roger A. Grimes

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers: The current state of the malicious code writing and cracker community How malicious code works, what types there are, and what it can and cannot do Common anti-virus defenses, including anti-virus software How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it Macro viruses affecting MS Word, MS Excel, and VBScript Java applets and ActiveX controls Enterprise-wide malicious code protection Hoaxes The future of malicious mobile code and how to combat such code These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever. Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.

Malicious Mobile Code: Virus Protection for Windows

by Roger A. Grimes

"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.

MCSE Core Elective Exams in a Nutshell

by Roger A. Grimes Pawan K. Bhardwaj

For Windows XP and Windows Server 2003 administrators preparing for Microsoft Certified Systems Engineer (MCSE) core exam 70-270, and core exams 70-297, and 70-298, this book is invaluable. Not only does it provide the resources you need to succeed on the exams, but to succeed in the real world as well. Think of this book as the notes you would have taken if you were to capture every essential nugget of information related to the skills measured in the core elective exams. To begin with, MCSE Core Elective Exams in a Nutshell allows you to see all of the topics expected for mastery in each of the exams. Each exam is covered in three parts: Exam Overview , Study Guide and Test Your Knowledge sections. This makes for easy reference and a great study aid. The Exams covered include: EXAM 70-270: Installing, Configuring, and Administering Microsoft Windows XP Professional EXAM 70-297: Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure EXAM 70-298: Designing Security for a Microsoft Windows Server 2003 Network Once you have completed the exams successfully, you will find the book to be a valuable reference to core Windows administration and security skills. This book uses the same successful format found in MCSE Core Required Exams in a Nutshell by William Stanek, and together they satisfy all of the Core exam requirements for your MCSE certification.

Showing 1 through 3 of 3 results


Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ���DAISY Text with Images���.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivonas Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.