LEADER 02300nam 2200577 450 001 9910815417103321 005 20200520144314.0 010 $a0-12-802731-2 010 $a0-12-802753-3 035 $a(CKB)2670000000585903 035 $a(EBL)1888756 035 $a(OCoLC)900652367 035 $a(SSID)ssj0001453313 035 $a(PQKBManifestationID)11786017 035 $a(PQKBTitleCode)TC0001453313 035 $a(PQKBWorkID)11489999 035 $a(PQKB)11055779 035 $a(Au-PeEL)EBL1888756 035 $a(CaPaEBR)ebr10999743 035 $a(CaONFJC)MIL679364 035 $a(CaSebORM)9780128027318 035 $a(MiAaPQ)EBC1888756 035 $a(EXLCZ)992670000000585903 100 $a20150112h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHow to defeat advanced malware $enew tools for protection and forensics /$fMax, Dalziel 205 $a1st edition 210 1$aWaltham, Massachusetts :$cSyngress,$d2015. 210 4$dİ2015 215 $a1 online resource (54 p.) 300 $aDescription based upon print version of record. 311 $a1-322-48082-6 320 $aIncludes bibliographical references. 330 $a How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed fo 606 $aComputer networks$xSecurity measures 606 $aMalware (Computer software) 615 0$aComputer networks$xSecurity measures. 615 0$aMalware (Computer software) 676 $a005.8 700 $aDalziel$b Max$01671405 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910815417103321 996 $aHow to defeat advanced malware$94033935 997 $aUNINA