Media praise for Malicious Mobile Code

"This book is indeed an eye opener for the normal computer user, and the junior system administrator. Laid out in detail, and covering almost every aspect of malicious mobile code out there today this book should indeed be read by everyone who owns a computer. Only through user education will one half of the battle be won against the never ending tide of malicious mobile code...this book is highly recommended for reading due to the plethora of viruses, macro viruses, and client side exploits out there today. It's gets an SFDC 8/10 from me."
--Security, October 2003

"Need protection for your insecure operating systems? This is your contraceptive! It looks like a technical book, it weighs as much as a technical book, it reads like a technical book. It must be a technical book. This is not a book you can sit down and read cover-to-cover, it has taken me several tries to read it. BUT it IS very informative. I have yet to pick this book up without learning something. It is as scary as the next Stephen King or Dean Koontz novel."
--Kenneth Wilcox, Boise Software Developers Group, Feb 2003

"Offers excellent understanding of the subject matter."
--Mike James, Computer Shopper, September 2002

"An excellent overview that doesn't call for a degree in computer science. The text is an example of technical communication at its best, presenting technical matter in clear language without either patronizing the reader, or leaving one adrift on a sea of acronyms and obtuse essential acquisition for public, educational, and corporate libraries."
--Major Keary, PC Update, June 2002

"This is the best book I have read covering these subjects. As a security and privacy enthusiast, I appreciate having this reference available."
--Don Phelps, GGCS Newsletter, April 2002

"It's always a pleasure to read a technical work that is clear, well-edited, and nicely laid out. That's certainly the case with 'Malicious Mobile Code,' a book that reflects the typically excellent quality of O'Reilly publication. The information presented is easy to find and use; it's also at the leading edge of the security industry?Grimes manages the tough trick of keeping the material both interesting and informative. For this reason alone, this book is a find for anyone with anti-virus duties."
--Lew Wagner, Security Management, February 2002

"A comprehensive guide to all computer viruses where they come from and how to stop the attacking your network of PCs. It's well-written and explains (without using jargon) the fundamental differences between types of viruses, such as worms and Trojans...Perfect for learning about Internet security."
--Internetworks, Dec 2001