LEADER 02333nam 2200589 450 001 9910463786903321 005 20200520144314.0 010 $a0-12-802731-2 010 $a0-12-802753-3 035 $a(CKB)2670000000585903 035 $a(EBL)1888756 035 $a(OCoLC)900652367 035 $a(SSID)ssj0001453313 035 $a(PQKBManifestationID)11786017 035 $a(PQKBTitleCode)TC0001453313 035 $a(PQKBWorkID)11489999 035 $a(PQKB)11055779 035 $a(MiAaPQ)EBC1888756 035 $a(CaSebORM)9780128027318 035 $a(Au-PeEL)EBL1888756 035 $a(CaPaEBR)ebr10999743 035 $a(CaONFJC)MIL679364 035 $a(EXLCZ)992670000000585903 100 $a20150112h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHow to defeat advanced malware $enew tools for protection and forensics /$fMax, Dalziel 205 $a1st edition 210 1$aWaltham, Massachusetts :$cSyngress,$d2015. 210 4$dİ2015 215 $a1 online resource (54 p.) 300 $aDescription based upon print version of record. 311 $a1-322-48082-6 320 $aIncludes bibliographical references. 330 $a How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed fo 606 $aComputer networks$xSecurity measures 606 $aMalware (Computer software) 608 $aElectronic books. 615 0$aComputer networks$xSecurity measures. 615 0$aMalware (Computer software) 676 $a005.8 700 $aDalziel$b Max$0962814 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910463786903321 996 $aHow to defeat advanced malware$92183105 997 $aUNINA