Muutke küpsiste eelistusi

E-raamat: How to Defeat Advanced Malware: New Tools for Protection and Forensics

Edited by (Co-founder and CTO at Bromium and Bromium Labs. California, United States.), (Founder, Concise Ac Ltd, UK)
  • Formaat: PDF+DRM
  • Ilmumisaeg: 05-Dec-2014
  • Kirjastus: Syngress Media,U.S.
  • Keel: eng
  • ISBN-13: 9780128027530
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 34,11 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 05-Dec-2014
  • Kirjastus: Syngress Media,U.S.
  • Keel: eng
  • ISBN-13: 9780128027530
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection.How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.Learn the basics of protecting your companys online-accessible assetsDiscover strategies that take advantage of micro-virtualization and BYODBecome adept at comparing and utilizing different endpoint security products and strategies
Author Biography ii
Contributing Editor Biography ix
Chapter 1 A Primer on Detection for Security
1(4)
1.1 Today's Approach: "Compromise-first Detection"
3(2)
Chapter 2 2014 Endpoint Exploitation Trends
5(6)
2.1 Zero-day Trends
5(2)
2.2 Notable Zero-day Exploitation Techniques
7(1)
2.3 Emerging Zero-day Exploitation Techniques
8(3)
Chapter 3 The Proposed Solution
11(4)
3.1 The Principle of Least Privilege
12(1)
3.2 Detection's Folly
13(2)
Chapter 4 Protection's Weak Link
15(4)
4.1 Desktop Virtualization Does not Secure the Endpoint
16(1)
4.2 Detection and Isolation Using VMs
17(2)
Chapter 5 Micro-Virtualization
19(18)
5.1 Related Work
20(4)
5.2 A practical Example
24(1)
5.3 Hardware-enforced Task Isolation
25(1)
5.4 Hardware Virtualization Technology
25(1)
5.5 Micro-Virtualization at Work
26(1)
5.6 The Microvisor
27(2)
5.7 Memory and CPU Isolation
29(1)
5.8 Virtualized File System (VFS)
29(1)
5.9 Virtualized IP Networking -- the Mobile SDN
30(3)
5.10 Virtualized Desktop Services
33(1)
5.11 Creation and Management of Micro-VMs
34(1)
5.12 Reducing the Attack Surface
34(3)
Chapter 6 Advanced Forensics and Analysis
37
6.1 Micro-VM Behavioral Analysis
38(1)
6.2 Advanced Live Forensics
39(1)
6.3 LAVA Architecture
39(2)
6.4 Conclusion
41
Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [ books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP). Simon Crosby is Cofounder and CTO at Bromium and Bromium Labs. The Bromium Labs team of security analysts has extensive experience in building innovative technologies to counter and defend against advanced attacks. While Bromium has created an innovative new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.