Главная · Поиск книг · Поступления книг · Top 40 · Форумы · Ссылки · Читатели

Настройка текста
Перенос строк


    Прохождения игр    
Demon's Souls |#13| Storm King
Demon's Souls |#12| Old Monk & Old Hero
Demon's Souls |#11| Мaneater part 2
Demon's Souls |#10| Мaneater (part 1)

Другие игры...


liveinternet.ru: показано число просмотров за 24 часа, посетителей за 24 часа и за сегодня
Rambler's Top100
Образование - Безруков Н.Н. Весь текст 1232.53 Kb

Компьютерная вирусология ч. 1

Предыдущая страница Следующая страница
1 ... 58 59 60 61 62 63 64  65 66 67 68 69 70 71 ... 106
USENIX Association Winter Conf., 1989
   [Duff89b] Duff T. Experience with viruses on UNIX systems //
Computing Systems, 1989, v.2, No 2, pp.155-171
   [Dvorak88] Dvorak J.C. Virus wars: a serious warning // PC Magazine,
1988, v.7, No 4, p.71
   [EDPAJ90] EDPAA testimony before US congress regarding computer
viruses // EDPAJ, 1990, v.2, pp.68-72
   [Eisenberg89] Eisenberg T., Gries D. et al. The Cornell comission: on
Morris and the worm // CACM, 1989, v.32, No 6, pp.706-709
   [Fak88] Fak V. Are we vulnerable to a virus attack ? A report from
Sweden // C&S, 1988, v.7, No 2, pp.151-155
   [Fastiggi] Fastiggi M.V. Detection of surreptitious insertion of
trojan horse or viral code in computer application programs //
Information Age, 1989, v.11, No 1, pp.3-18
   [Fites89] Fites P., Johnston P., Kratz M. The computer virus crisis.-
N.Y.: Van Nostrand Reinhold, 1989, 171 p.
   [Gardner89] Gardner P.E. The Internet worm: what was said and when //
C&S, 1989, v.8, No 4, pp.291-296
   [Gemignani85] Gemignani M. The software protection worm: can it turn
against its Master ? // Abacus, 1985, v.2, No 4, pp.39-40,51
   [Gemignani89] Gemignani M. Viruses and criminal law // CACM, 1989,
v.32, No 6, pp.669-671
   [Gibson84] Gibson W. Neuromancer.- N.Y.: Ace Science Fiction, 1984
   [Gibson88] Gibson W. Mona Lisa Overdrive.- N.Y.: Bantam Books, 1988
   [Glath88] Glath R. The case of the "Gerbil virus" that wasn't // C&S,
1988, v.7, No 5, pp.451-453
   [Glath90] Glath R.M. Stealth viruses ... weapon systems of tomorrow ?
// DC, 1990, v.3, No 5, pp.34-36
   [Gleissner89] Gleissner W. A mathematical theory for the spread of
computer viruses // C&S, 1989, v.8, No 1, pp.35-41
   [Glendown89] Glendown G. Bootblaker: bootblock-virusprotector fur den
Amiga // Toolbox, 1989, v.4, No 1, pp.51-53
   [Gliss88] Gliss H. EARN network hit by student prank // CF&SB, 1988,
v.10, No 5, pp.1-4
   [Goodwins88] Goodwins R. Understanding the minds behind the viruses
// CF&SB, 1988, v.10, No 7, pp.3-4
   [Graf90] Graf J. Interview mit Deutschlands erstem virenprogrammierer
// Chip, 1990, No 3, pp.405-406
   [Greenberg89] Greenberg R.M. Know thy viral enemy // Byte, 1989,
No 6, pp.275-280
   [Gruman89] Gruman G. Viruses and worms: what to do ? // IEEE
Software, 1989, v.6, No 2, pp.93-96
   [Gunn74] Gunn J.B. Use of virus functions to provide a virtual APL
interpreter under user control // APL Quote Quad, 1974, v.5, No 4,
pp.163-168
   [Hackenberg89] Hackenberg G. Programmschadlinge - eine virologie //
DuD, 1989, No 8, pp.392-397
   [Hafner88] Hafner K.M. Is your computer secure ? // Business Week,
1988, No 3063 (August 1), pp.64-72
   [Herschberg90] Herschberg I.S., Paans R. Friday the 13th, facts and
fancies // C&S, 1990, v.9, No 2, pp.125-130
   [Highland87a] Highland H.J. Computer viruses and sudden death ! //
C&S, 1987, v.6, No 1, pp.8-10
   [Highland87b] Highland H.J. Data physician - a virus protection
program // C&S, 1987, v.6, No 1, pp.73-79
   [Highland88a] Highland H.J. Case history of a virus attack // C&S,
1988, v.7, No 1, pp.3-4
   [Highland88b] Highland H.J. Computer viruses - a post mortem // C&S,
1988, v.7, No 2, pp.117-125
   [Highland88c] Highland H.J. Anatomy of a virus attack // C&S, 1988,
v.7, No 2, pp.145-150
   [Highland88d] Highland H.J. An overview of 18 virus protection
products // C&S, 1988, v.7, No 2, pp.157-161
   [Highland88e] Highland H.J. How to combat a computer virus // C&S,
1988, v.7, No 2, pp.157-163
   [Highland88f] Highland H.J. How to test a virus filter without a
virus // C&S, 1988, v.7, No 3, pp.235-242
   [Highland88g] Highland H.J. How to obtain a computer virus // C&S,
1988, v.7, No 4, pp.337-346
   [Highland88h] Highland H.J. The BRAIN virus: fact and fantasy // C&S,
1988, v.7, No 4, pp.367-370
   [Highland88i] Highland H.J. Computer viruses: media hyperbole, errors
and ignorance // C&S, 1988, v.7, No 5, pp.439-449
   [Highland88j] Highland H.J. Virus filter evaluation report // C&S,
1988, v.7, No 6, pp.533-541
   [Highland88k] Highland H.J. Case history of a virus attack // CF&SB,
1988, v.10, No 4, pp.4-7
   [Highland88l] Highland H.J. The BRAIN virus - fact and fantasy //
CF&SB, 1988, v.10, No 11, pp.4-9
   [Highland89a] The computer virus handbook / H.J.Highland (ed.).-
Oxford: Elsevier Advanced Technology, 1989
   [Highland89b] Highland H.J. The Milnet/Arpanet attack // C&S, 1989,
v.8, No 1, pp.3-13
   [Highland89c] Highland H.J. The Italian or Ping-pong virus // C&S,
1989, v.8, No 2, pp. 91-98
   [Highland89d] Highland H.J. A macro virus // C&S, 1989, v.8, No 3,
pp.178-188
   [Highland89e] Highland H.J. Harmless viruses do not exist // C&S,
1989, v.8, No 4, pp.276-278
   [Highland89f] Highland H.J. The Marijuana virus revisited // C&S,
1989, v.8, No 5, pp.369-380
   [Highland89g] Highland H.J. The Internet worm ... continued // C&S,
1989, v.8, No 6, pp.460-478
   [Highland89h] Highland H.J. How to detect a computer virus in your
system // C&S, 1989, v.8, No 7, pp.553-561
   [Highland89i] Highland H.J. Protecting hardware and software // C&S,
1989, v.8, No 8, pp.647-657
   [Highland89j] Highland H.J. Datacrime virus and new anti-virus
products // C&S, 1989, v.8, No 8, pp.659-661
   [Highland89k] Highland H.J. VCHECKER - a virus search program // C&S,
1989, v.8, No 8, pp.669-674
   [Highland89l] Highland H.J. Two new viruses pose threat // CF&SB,
1989, v.11, No 4, pp.20-21
   [Highland89m] Highland H.J. The ARPANET virus attack // CF&SB, 1989,
v.11, No 5, pp.7-10
   [Highland89n] Highland H.J. The Italian virus // CF&SB, 1989, v.11,
No 7, pp.7-8
   [Highland90a] Highland H.J. New directions for anti-virus measures //
C&S, 1990, v.9, No 1, pp.7-8
   [Highland90b] Highland H.J. Emerging viruses, emerging threat // C&S,
1990, v.9, No 2, pp.104-108
   [Highland90c] Highland H.J. A spate of new virus // C&S, 1990, v.9,
No 3, pp.205-206
   [Hoffman89] Hoffman G. "Wurm" im Internet // DuD, 1989, No 2,
pp.63-70
   [Hoffmeister87a] Hoffmeister F. An approach to defend computers
against computer viruses // Proc. IASTED Int. Symp.: Applied
Informatics, 1987, pp.176-179
   [Hoffmeister87b] Hoffmeister F. Risiken durch computerviren - erste
losungsansatze // PIK, 1987, v.10, No 3, pp.196-202
   [Honan89] Honan P. Avoiding virus hysteria // Personal Computing,
1989, v.13, No 5, pp.85-92
   [Hoppenrath89] Hoppenrath D. Computerviren: problem oder psychose? //
Computer Personlich, 1989, No 3, pp.45-47
   [Horwitt88] Horwitt E. Virus scare shakes IBM MIS managers // CW,
1988, v.XXII, No 46 (Nov. 14), p.8
   [Hruska88a] Hruska J. Data viruses, trojan horses and logic bombs -
how to combat them ? // CF&SB, 1988, v.10, No 6, pp.5-7
   [Hruska88b] Hruska J. "BRAIN" - the truth is revealed // CF&SB, 1988,
v.10, No 7, pp.2-3
   [Hruska90] Hruska J. Computer viruses // Information Age, 1990, v.12,
No 2, pp.100-108
   [Hunter89] Hunter P. Virus attack // Communications Management, 1989,
April, pp.36-38
   [Isselhorst89] Isselhorst H. Massnahmen zum manipulationsschutz von
software - notwendigkeit, arten, bewertung // DuD, 1989, No 8,
pp.398-402
   [Jackson88] Jackson K. Virus alters networking // CommunicationsWeek,
1988, No 222 (Nov. 14)
   [Jackson89a] Jackson K. "1813" strikes city university // CF&SB,
1989, v.11, No 4, p.19
   [Jackson89b] Jackson K. Vaccine // CF&SB, 1989, v.11, No 7, pp.13-16
   [Joepgen89] Joepgen H.-G. "Viren", "minen" und "trojaner" // MC,
1989, No 7, pp.44-48; No 8, pp.80-89; No 9, pp.68-78; No 10, pp.118-124
   [JonesH88] Jones H. Gremlins that grind your system down // PC
Business World, 1988, v.4, No 7, p.8
   [JonesL88] Jones L.G. Computer viruses: threat or media hype ? //
EDPAJ, 1988, v.3, pp.25-32
   [Jorga88] Jorga F. "ANTIBIO"tica gegen virus - programme //
Wirtschaftsschutz + Sicherheitstechnik, 1988, No 7, pp.373-374
   [Joseph88] Joseph M., Avizienis A. A fault tolerance approach to
computer viruses // Proc. IEEE Symp. on Security and Privacy, 1988,
pp.52-58
   [Joseph89] Joseph M.K. A response to criticisms of a virus detection
scheme // SIGSAC Rewiew, 1989, v.7, No 3, pp.3-5
   [Joyce88] Joyce E.J. Software viruses: PC-health enemy number one //
Datamation, 1988, v.34, No 20, pp.27-30
   [Kadlof89] Kadlof A. Wirusy atakuja // Komputer, 1989, No 7/8,
pp.28-29; No 9, pp.26-28; No 10, pp.35-37; 1990, No 1/3, pp.34-35
   [Kadlof90a] Kadlof A. Wirusy komputerowe w Polsce // PCkurier, 1990,
No 8, pp.10-11; No 15, pp.10-11; No 21, pp.14-15
   [Kadlof90b] Kadlof A. Uwaga: nove wirusy // PCkurier, 1990, No 9,
pp.6-7
   [Kadlof90c] Kadlof A. Przeciw wirusom // PCkurier, 1990,
No 11, p.7; No 12, pp.15-17; No 13, pp.14-16; No 14, pp.16-17; No 16,
pp.14-15; No 18, pp.14-15; No 19, pp.14-15
   [Kadlof90d] Kadlof A. Identyfikacja wirusow komputerowych //
PCkurier, 1990, No 22, pp.20-21
   [Kаnel88] Kаnel A. Informatigue: le Sida se repand // La Revue
Polytechnique, 1988, No 1502, pp.985-987
   [Kane89] Kane P. V.I.R.U.S. protection: vital information resources
under siege.- N.Y.: Bantam Books.- 477 p.- (с дискетой утилит Dr. Panda)
   [Kask88] Kask A. Computer viruses are as easy to prevent as the
common cold // InfoWorld, 1988, v.10, No 50 (Dec. 12), p.49
   [Kastenmuller88] Kastenmuller S. Erkennen von "computer-viren" //
KES, 1988, v.4, No 4, pp.255-263
   [Kelly89] Kelly M. Treating viruses sensibly // Practical Computing,
1989, v.12, No 5, pp.72-73
   [King89] King M. Viruses and related mechanisms in MVS // Software
World, 1989, v.20, No 1, pp.2-4
   [King90] King M. Solving the virus problem: how to protect your
system // Technical Support, 1990, v.4, No 1, pp.25-28
   [Klopp90] Klopp Ch. Software vendors capitalize on security needs //
C&S, 1990, v.9, No 1, pp.33-35
   [Kocher89] Kocher B. A hygiene lesson // CACM, 1989, v.32, No 1,
pp.3,6
   [Koziel88] Koziel T., Leister G. Die viren sind da: bootsector -
viren erobern den Atari ST // C't, 1988, No 7, pp.72-80
   [Krabel87] Krabel E. Die viren kommen // C't, 1987, No 4, pp.108-117
   [Kurzban89] Kurzban S.A. Viruses and worms - what can you do ? //
SIGSAC Rewiew, 1989, v.7, No 1, pp.16-32
   [Lai88] Lai N., Gray T.E. Strengthening discretionary access controls
to inhibit trojan horses and computer viruses // Proc. USENIX
Association Summer Conf., 1988, pp.275-286
   [Lammer88] Lammer P. Protection from infection // Systems
International, 1988, v.16, No 6, pp.75-76
   [Majewski88] Majewski W. Wirusowa goraczka // Komputer, 1988, No 11,
pp.35-39
   [Margolis88] Margolis N., Ryan A.J. What did the worm teach us ? //
CW, 1988, v.XXII, No 46 (Nov. 14), p.14
   [Marotta89] Marotta M.E. Computer viruses: the security challenge //
Systems 3X & AS World, 1989, v.17, No 3, pp.82-90
   [Marshall88a] Marshall E. The scourge of computer viruses // Science,
1988, v.240, No 4849 (Apr. 8), pp.133-134
   [Marshall88b] Marshall E. Worm invades computer networks // Science,
1988, v.242, No 4880 (Nov. 11), pp.855-856
   [Marshall88c] Marshall E. The worm's aftermath // Science, 1988,
v.242, No 4882 (Nov. 25), pp.1121-1122
   [McAfee89a] McAfee J. Managing the virus threat // CW, 1989, v.XXIII,
No 6 (Feb. 13), pp.89-96
   [McAfee89b] McAfee J. The virus cure // Datamation, 1989, v.35, No 4,
pp.29-40
   [McBroom89] McBroom V. Computer viruses: what they are, how to
protect against them // Software Protection, 1989, v.VIII, No 3, pp.1-16
   [McIlroy89] McIlroy M.D. Virology 101 // Computing Systems, 1989,
v.2, No 2, pp.173-181
   [McLellan88] McLellan V. Computer systems under seige (viruses) //
EDPAJ, 1988, v.3, pp.33-38
   [Menkus89] Menkus B. The computer virus situation is not encouraging
// C&S, 1989, v.8, No 2, pp.115-119
   [Menkus90] Menkus B. In the matter of Robert Tappan Morris, jr //
EDPAJ, 1990, v.2, pp.10-11
   [Miedel89a] Miedel L. Schadlinge im boot-block // Chip, 1989, No 7,
Предыдущая страница Следующая страница
1 ... 58 59 60 61 62 63 64  65 66 67 68 69 70 71 ... 106
Ваша оценка:
Комментарий:
  Подпись:
(Чтобы комментарии всегда подписывались Вашим именем, можете зарегистрироваться в Клубе читателей)
  Сайт:
 
Комментарии (3)

Реклама