AVIEN malware defense guide for the Enterprise:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress
2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIENs sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature. * Customer Power takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist. * Stalkers on Your Desktop considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today. * A Tangled Web discusses threats and countermeasures in the context of the World Wide Web. * Big Bad Bots tackles bots and botnets, arguably Public Cyber-Enemy Number One. * Cr̈me de la CyberCrime takes readers into the underworld of old-school virus writing, criminal business models, and predicting future malware hotspots. * Defense in Depth takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies. * Perilous Outsorcery offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it. * Education in Education offers some insights into user education from an educationalists perspective, and looks at various aspects of security in schools and other educational establishments. * DIY Malware Analysis is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools. * Antivirus Evaluation & Testing continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software. * AVIEN & AVIEWS: the Future looks at future developments in AVIEN and AVIEWS. Includes bibliographical references (p. 503-515) and index Front Cover; AVIEN Malware Defense Guide for the Enterprise; Copyright Page; Lead Author and Technical Editor; Foreword Author; Contributors; Contents; Foreword; Preface; Introduction; Chapter 1: Customer Power and AV Wannabes; Chapter 2: Stalkers on Your Desktop; Chapter 3: A Tangled Web; Chapter 4: Big Bad Botnets; Chapter 5: Cregraveme de la Cybercrime; Chapter 6: Defense-in-depth; Chapter 7: Perilous Outsorcery; Chapter 8: Education in Education; Chapter 9: DIY Malware Analysis; Chapter 10: Antimalware Evaluation and Testing; Chapter 11: AVIEN and AVIEWS: the Future; Appendix A: Resources |
Beschreibung: | 1 Online-Ressource (xxxv, 540 p.) |
ISBN: | 0080558666 1597491640 9780080558660 9781597491648 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043045204 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080558666 |c electronic bk. |9 0-08-055866-6 | ||
020 | |a 1597491640 |9 1-59749-164-0 | ||
020 | |a 9780080558660 |c electronic bk. |9 978-0-08-055866-0 | ||
020 | |a 9781597491648 |9 978-1-59749-164-8 | ||
035 | |a (OCoLC)228148124 | ||
035 | |a (DE-599)BVBBV043045204 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a AVIEN malware defense guide for the Enterprise |c David Harley ... [et al.] ; foreword by Robert S. Vibert |
246 | 1 | 3 | |a Anti-Virus Information Exchange Network malware defense guide for the Enterprise |
264 | 1 | |a Burlington, MA |b Syngress |c 2007 | |
300 | |a 1 Online-Ressource (xxxv, 540 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIENs sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature. | ||
500 | |a * Customer Power takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist. * Stalkers on Your Desktop considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today. * A Tangled Web discusses threats and countermeasures in the context of the World Wide Web. * Big Bad Bots tackles bots and botnets, arguably Public Cyber-Enemy Number One. * Cr̈me de la CyberCrime takes readers into the underworld of old-school virus writing, criminal business models, and predicting future malware hotspots. * Defense in Depth takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies. | ||
500 | |a * Perilous Outsorcery offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it. * Education in Education offers some insights into user education from an educationalists perspective, and looks at various aspects of security in schools and other educational establishments. * DIY Malware Analysis is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools. * Antivirus Evaluation & Testing continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software. * AVIEN & AVIEWS: the Future looks at future developments in AVIEN and AVIEWS. | ||
500 | |a Includes bibliographical references (p. 503-515) and index | ||
500 | |a Front Cover; AVIEN Malware Defense Guide for the Enterprise; Copyright Page; Lead Author and Technical Editor; Foreword Author; Contributors; Contents; Foreword; Preface; Introduction; Chapter 1: Customer Power and AV Wannabes; Chapter 2: Stalkers on Your Desktop; Chapter 3: A Tangled Web; Chapter 4: Big Bad Botnets; Chapter 5: Cregraveme de la Cybercrime; Chapter 6: Defense-in-depth; Chapter 7: Perilous Outsorcery; Chapter 8: Education in Education; Chapter 9: DIY Malware Analysis; Chapter 10: Antimalware Evaluation and Testing; Chapter 11: AVIEN and AVIEWS: the Future; Appendix A: Resources | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 local | |
650 | 7 | |a Computer security / Management |2 local | |
650 | 7 | |a Computer viruses |2 local | |
650 | 7 | |a Malware (Computer software) |2 local | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security |x Management | |
650 | 4 | |a Computer viruses | |
700 | 1 | |a Harley, David |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239207 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028469742 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239207 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239207 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175411840548864 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043045204 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)228148124 (DE-599)BVBBV043045204 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05430nmm a2200541zc 4500</leader><controlfield tag="001">BV043045204</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080558666</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055866-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491640</subfield><subfield code="9">1-59749-164-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558660</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055866-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491648</subfield><subfield code="9">978-1-59749-164-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228148124</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043045204</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">AVIEN malware defense guide for the Enterprise</subfield><subfield code="c">David Harley ... [et al.] ; foreword by Robert S. Vibert</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Anti-Virus Information Exchange Network malware defense guide for the Enterprise</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxv, 540 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIENs sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">* Customer Power takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist. * Stalkers on Your Desktop considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today. * A Tangled Web discusses threats and countermeasures in the context of the World Wide Web. * Big Bad Bots tackles bots and botnets, arguably Public Cyber-Enemy Number One. * Cr̈me de la CyberCrime takes readers into the underworld of old-school virus writing, criminal business models, and predicting future malware hotspots. * Defense in Depth takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">* Perilous Outsorcery offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it. * Education in Education offers some insights into user education from an educationalists perspective, and looks at various aspects of security in schools and other educational establishments. * DIY Malware Analysis is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools. * Antivirus Evaluation & Testing continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software. * AVIEN & AVIEWS: the Future looks at future developments in AVIEN and AVIEWS.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 503-515) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Front Cover; AVIEN Malware Defense Guide for the Enterprise; Copyright Page; Lead Author and Technical Editor; Foreword Author; Contributors; Contents; Foreword; Preface; Introduction; Chapter 1: Customer Power and AV Wannabes; Chapter 2: Stalkers on Your Desktop; Chapter 3: A Tangled Web; Chapter 4: Big Bad Botnets; Chapter 5: Cregraveme de la Cybercrime; Chapter 6: Defense-in-depth; Chapter 7: Perilous Outsorcery; Chapter 8: Education in Education; Chapter 9: DIY Malware Analysis; Chapter 10: Antimalware Evaluation and Testing; Chapter 11: AVIEN and AVIEWS: the Future; Appendix A: Resources</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Management</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malware (Computer software)</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Harley, David</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239207</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028469742</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239207</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239207</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043045204 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:52Z |
institution | BVB |
isbn | 0080558666 1597491640 9780080558660 9781597491648 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028469742 |
oclc_num | 228148124 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxxv, 540 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
spelling | AVIEN malware defense guide for the Enterprise David Harley ... [et al.] ; foreword by Robert S. Vibert Anti-Virus Information Exchange Network malware defense guide for the Enterprise Burlington, MA Syngress 2007 1 Online-Ressource (xxxv, 540 p.) txt rdacontent c rdamedia cr rdacarrier Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIENs sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature. * Customer Power takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist. * Stalkers on Your Desktop considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today. * A Tangled Web discusses threats and countermeasures in the context of the World Wide Web. * Big Bad Bots tackles bots and botnets, arguably Public Cyber-Enemy Number One. * Cr̈me de la CyberCrime takes readers into the underworld of old-school virus writing, criminal business models, and predicting future malware hotspots. * Defense in Depth takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies. * Perilous Outsorcery offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it. * Education in Education offers some insights into user education from an educationalists perspective, and looks at various aspects of security in schools and other educational establishments. * DIY Malware Analysis is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools. * Antivirus Evaluation & Testing continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software. * AVIEN & AVIEWS: the Future looks at future developments in AVIEN and AVIEWS. Includes bibliographical references (p. 503-515) and index Front Cover; AVIEN Malware Defense Guide for the Enterprise; Copyright Page; Lead Author and Technical Editor; Foreword Author; Contributors; Contents; Foreword; Preface; Introduction; Chapter 1: Customer Power and AV Wannabes; Chapter 2: Stalkers on Your Desktop; Chapter 3: A Tangled Web; Chapter 4: Big Bad Botnets; Chapter 5: Cregraveme de la Cybercrime; Chapter 6: Defense-in-depth; Chapter 7: Perilous Outsorcery; Chapter 8: Education in Education; Chapter 9: DIY Malware Analysis; Chapter 10: Antimalware Evaluation and Testing; Chapter 11: AVIEN and AVIEWS: the Future; Appendix A: Resources COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures local Computer security / Management local Computer viruses local Malware (Computer software) local Computer networks Security measures Computer security Management Computer viruses Harley, David Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239207 Aggregator Volltext |
spellingShingle | AVIEN malware defense guide for the Enterprise COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures local Computer security / Management local Computer viruses local Malware (Computer software) local Computer networks Security measures Computer security Management Computer viruses |
title | AVIEN malware defense guide for the Enterprise |
title_alt | Anti-Virus Information Exchange Network malware defense guide for the Enterprise |
title_auth | AVIEN malware defense guide for the Enterprise |
title_exact_search | AVIEN malware defense guide for the Enterprise |
title_full | AVIEN malware defense guide for the Enterprise David Harley ... [et al.] ; foreword by Robert S. Vibert |
title_fullStr | AVIEN malware defense guide for the Enterprise David Harley ... [et al.] ; foreword by Robert S. Vibert |
title_full_unstemmed | AVIEN malware defense guide for the Enterprise David Harley ... [et al.] ; foreword by Robert S. Vibert |
title_short | AVIEN malware defense guide for the Enterprise |
title_sort | avien malware defense guide for the enterprise |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures local Computer security / Management local Computer viruses local Malware (Computer software) local Computer networks Security measures Computer security Management Computer viruses |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security / Management Computer viruses Malware (Computer software) Computer networks Security measures Computer security Management |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239207 |
work_keys_str_mv | AT harleydavid avienmalwaredefenseguidefortheenterprise AT harleydavid antivirusinformationexchangenetworkmalwaredefenseguidefortheenterprise |