How to outsmart a computer virus


May 01, 2005

A NEW BOOK BY Peter Szor, security architect for Symantec Security Response, provides an insider's view of computer virus research and how threats are analyzed to provide better security measurement.

The Art of Computer Virus Research and Defense focuses primarily on self-replicating malicious code in all three infection techniques—file/storage, in-memory, and network. "The technique for computer virus analysis is a subject that has long been overlooked in the field of publishing regarding cyber threats," said Szor. "Such techniques have yet to be discussed in sufficient length from the highly technical perspective that the subject demands—a perspective that can only be provided by an actual professional of virus research. Therefore, this book is aimed at and will be most useful for the IT and security professional who fight against malicious code on a daily basis."

Szor takes the reader behind the scenes of anti-virus research, showing how they are analyzed, how they spread, and - most importantly - how to effectively defend against them. The Art of  Computer Virus Research and Defense offers an encyclopedic treatment of the computer virus, including: a history of computer viruses, virus behavior, classification, protection strategies, anti-virus and worm-blocking techniques, and how to conduct an accurate threat analysis. 

As one of the lead researchers behind Norton AntiVirus, Szor studies viruses every day. His book will be part of any company’s or professional’s arsenal. By showing how viruses really work, The Art of  Computer Virus Research and Defense will help security professionals and students protect against them, recognize them, and analyze and limit the damage they can do.

Click here to order a copy of The Art of Virus Research and Defense.

Show Comments
Hide Comments

Join the discussion

We welcome your thoughtful comments.
All comments will display your user name.

Want to participate in the discussion?

Register for free

Log in for complete access.


No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments