Syndetics cover image
Image from Syndetics

How to defeat advanced malware : new tools for protection and forensics / Max, Dalziel.

By: Material type: TextTextPublisher: Waltham, Massachusetts : Syngress, 2015Copyright date: ©2015Description: 1 online resource (54 pages) : illustrations (some color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780128027530 (e-book)
Subject(s): Genre/Form: Additional physical formats: Print version:: How to defeat advanced malware : new tools for protection and forensics.DDC classification:
  • TK5105.59 23
LOC classification:
  • 005.8 .D359 2015
Online resources:
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Online Books Ebrary Online Books Colombo Available CBERA1000560
Ebrary Online Books Ebrary Online Books Jaffna Available JFEBRA1000560
Ebrary Online Books Ebrary Online Books Kandy Available KDEBRA1000560
Total holds: 0

Enhanced descriptions from Syndetics:

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection.How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.- Learn the basics of protecting your company's online-accessible assets- Discover strategies that take advantage of micro-virtualization and BYOD- Become adept at comparing and utilizing different endpoint security products and strategies

Description based on online resource; title from PDF title page (ebrary, viewed January 10, 2015).

Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.

There are no comments on this title.

to post a comment.