How to Defeat Advanced Malware: New Tools for Protection and Forensics
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by B...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Saint Louis
Elsevier Science
2014
|
Schlagworte: | |
Zusammenfassung: | How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization. Learn the basics of protecting your company's online-accessible assetsDiscover strategies that take advantage of micro-virtualization and BYODBecome adept at comparing and utilizing different endpoint security products and strategies |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (54 pages) |
ISBN: | 9780128027530 9780128027318 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043615717 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780128027530 |9 978-0-12-802753-0 | ||
020 | |a 9780128027318 |c Print |9 978-0-12-802731-8 | ||
035 | |a (ZDB-30-PQE)EBC1888756 | ||
035 | |a (ZDB-89-EBL)EBL1888756 | ||
035 | |a (ZDB-38-EBR)ebr10999743 | ||
035 | |a (OCoLC)900652367 | ||
035 | |a (DE-599)BVBBV043615717 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Dalziel, Henry |e Verfasser |4 aut | |
245 | 1 | 0 | |a How to Defeat Advanced Malware |b New Tools for Protection and Forensics |
264 | 1 | |a Saint Louis |b Elsevier Science |c 2014 | |
264 | 4 | |c © 2015 | |
300 | |a 1 online resource (54 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization. Learn the basics of protecting your company's online-accessible assetsDiscover strategies that take advantage of micro-virtualization and BYODBecome adept at comparing and utilizing different endpoint security products and strategies | ||
650 | 4 | |a Computer networks -- Security measures | |
650 | 4 | |a Malware (Computer software) | |
700 | 1 | |a Crosby, Simon |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Dalziel, Henry |t How to Defeat Advanced Malware : New Tools for Protection and Forensics |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029029776 |
Datensatz im Suchindex
_version_ | 1804176358192971776 |
---|---|
any_adam_object | |
author | Dalziel, Henry |
author_facet | Dalziel, Henry |
author_role | aut |
author_sort | Dalziel, Henry |
author_variant | h d hd |
building | Verbundindex |
bvnumber | BV043615717 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1888756 (ZDB-89-EBL)EBL1888756 (ZDB-38-EBR)ebr10999743 (OCoLC)900652367 (DE-599)BVBBV043615717 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02651nmm a2200397zc 4500</leader><controlfield tag="001">BV043615717</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128027530</subfield><subfield code="9">978-0-12-802753-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128027318</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-802731-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1888756</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1888756</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10999743</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)900652367</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043615717</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dalziel, Henry</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to Defeat Advanced Malware</subfield><subfield code="b">New Tools for Protection and Forensics</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Saint Louis</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (54 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization. Learn the basics of protecting your company's online-accessible assetsDiscover strategies that take advantage of micro-virtualization and BYODBecome adept at comparing and utilizing different endpoint security products and strategies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Crosby, Simon</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Dalziel, Henry</subfield><subfield code="t">How to Defeat Advanced Malware : New Tools for Protection and Forensics</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029029776</subfield></datafield></record></collection> |
id | DE-604.BV043615717 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:55Z |
institution | BVB |
isbn | 9780128027530 9780128027318 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029029776 |
oclc_num | 900652367 |
open_access_boolean | |
physical | 1 online resource (54 pages) |
psigel | ZDB-30-PQE |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Science |
record_format | marc |
spelling | Dalziel, Henry Verfasser aut How to Defeat Advanced Malware New Tools for Protection and Forensics Saint Louis Elsevier Science 2014 © 2015 1 online resource (54 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization. Learn the basics of protecting your company's online-accessible assetsDiscover strategies that take advantage of micro-virtualization and BYODBecome adept at comparing and utilizing different endpoint security products and strategies Computer networks -- Security measures Malware (Computer software) Crosby, Simon Sonstige oth Erscheint auch als Druck-Ausgabe Dalziel, Henry How to Defeat Advanced Malware : New Tools for Protection and Forensics |
spellingShingle | Dalziel, Henry How to Defeat Advanced Malware New Tools for Protection and Forensics Computer networks -- Security measures Malware (Computer software) |
title | How to Defeat Advanced Malware New Tools for Protection and Forensics |
title_auth | How to Defeat Advanced Malware New Tools for Protection and Forensics |
title_exact_search | How to Defeat Advanced Malware New Tools for Protection and Forensics |
title_full | How to Defeat Advanced Malware New Tools for Protection and Forensics |
title_fullStr | How to Defeat Advanced Malware New Tools for Protection and Forensics |
title_full_unstemmed | How to Defeat Advanced Malware New Tools for Protection and Forensics |
title_short | How to Defeat Advanced Malware |
title_sort | how to defeat advanced malware new tools for protection and forensics |
title_sub | New Tools for Protection and Forensics |
topic | Computer networks -- Security measures Malware (Computer software) |
topic_facet | Computer networks -- Security measures Malware (Computer software) |
work_keys_str_mv | AT dalzielhenry howtodefeatadvancedmalwarenewtoolsforprotectionandforensics AT crosbysimon howtodefeatadvancedmalwarenewtoolsforprotectionandforensics |