Chapter 9. Going Deeper

Step back for just a minute, and consider all of the different malware specimens we've seen so far in this book. We started out innocently enough in Chapter 1, discussing different software technologies and how they might be subject to attack by malware. In Chapter 2, we looked at viruses and analyzed how malevolent code could infect a single computer system, attaching itself to existing software on the box. Then, we watched as the malware spread itself across a network, using worm propagation strategies in Chapter 3 and mobile code techniques in Chapter 4. In a nutshell, these initial chapters were focused on propagation strategies for malware.

We actually took a slight turn when we jumped into Chapter 5, where we addressed ...

Get Malware: Fighting Malicious Code now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.