MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Managing computer viruses / Eric Louw and Neil Duffy.

By: Louw, Eric.
Contributor(s): Duffy, Neil M.
Material type: materialTypeLabelBookPublisher: Oxford. New York : Oxford University Press, 1992Description: ix, 171 p. : ill. ; 24 cm.ISBN: 0198539738 (hbk.); 0198539746 (pbk.).Subject(s): Computer virusesDDC classification: 005.8
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Store Item 005.8 (Browse shelf(Opens below)) 1 Available 00022901
Total holds: 0

Enhanced descriptions from Syndetics:

This book presents a concise overview of the problem and a detailed framework for dealing with computer viruses in organizations. Managers are the target audience, and will find that it offers more than the usual technical information. There is a wealth of advice, much of which applies to the problem of computer security in general.

Includes bibliographical references (p. [123]-133) and index.

Table of contents provided by Syndetics

  • 1 The Destructive Potential of Computer Viruses
  • 2 The Nature of Computer Viruses
  • 3 The Biological Analogy
  • 4 Protection Against Computer Viruses
  • 5 Computer Viruses--Current and Future
  • 6 Virus Control Methodologies
  • 7 Conclusions
  • 8 A Generic DOS Virus
  • 9 Known Viruses
  • 10 Turing Machines
  • 11 Biological Viruses
  • 12 Information Storage in Cells
  • 13 Review of Anti-Virus Software

Reviews provided by Syndetics

CHOICE Review

The frequency of destructive experiences related to computer viruses continues to diminish, a positive trend due, in large measure, to the contributions of authors such as Louw and Duffy. Although this book is brief, it is appropriately broad in scope and the coverage is particularly relevant. A liberal use of analogies and a straightforward writing style make it easy to read. The material is presented, primarily, within the context of a dominant triad--prevention, detection, and recovery. Initially, the authors set the stage by elaborating on the various ways in which computer viruses inflict damage. With that background established, they then detail policies and practices that may be used as protective measures. Cogently presented are operational controls that may be employed for a large organization, followed by the security requirements more suited to a small organization. As a bonus, a helpful, if not exhaustive, list of known viruses is presented. And, finally, for those who desire a perspective with more depth, there is an extensive list of references on the general topic of computer viruses. All levels. E. Hook; formerly, Gettysburg College

Powered by Koha