Summary

Chapter 1 gave a generalized overview of malicious mobile code and the world of malicious code writers. You should now be familiar with viruses, worms, Trojans, malicious ActiveX and Java applets, and Internet scripting attacks. Subsequent chapters will cover each type of malicious mobile code in detail. Chapter 2 starts the first lesson by covering DOS viruses and computer virus technology.

Get Malicious Mobile Code now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.