Hide search box
Advanced search
(incl. VAT) Net price: PLN
Purchase form
To cart

How to Defeat Advanced Malware

New Tools for Protection and Forensics

Authors: Henry Dalziel, Simon Crosby Publisher: Elsevier Science Publication date: 2014 Publication language: Angielski Number of pages: 54 Publication formats: EAN: 9780128027530 ISBN: 9780128027530 Category: Computer programming / software development Databases & the Web Internet: general works Computer security Publisher's index: C2013-0-23146-9 Bibliographic note: Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).

Description

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.

This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection.

How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

  • Learn the basics of protecting your company's online-accessible assets
  • Discover strategies that take advantage of micro-virtualization and BYOD
  • Become adept at comparing and utilizing different endpoint security products and strategies

TOC

  • Cover 2
  • Title Page 5
  • Copyright Page 6
  • Table of contents 7
  • Author Biography 9
  • Contributing Editor Biography 11
  • Chapter 1 - A Primer on Detection for Security 13
    • 1.1 Today’s approach: “compromise-first detection” 15
  • Chapter 2 - 2014 Endpoint Exploitation Trends 17
    • 2.1 Zero-day trends 17
    • 2.3 Emerging zero-day exploitation techniques 20
  • Chapter 3 - The Proposed Solution 23
    • 3.1 The principle of least privilege 24
    • 3.2 Detection’s folly 25
  • Chapter 4 - Protection’s Weak Link 27
Show more

Author's affiliation

Henry Dalziel: Founder, Concise Ac Ltd, UK