|
|
|
|
LEADER |
04681cam a2200721Ii 4500 |
001 |
900652367 |
003 |
OCoLC |
005 |
20180526095744.5 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
150123t20152015maua ob 000 0 eng d |
019 |
|
|
|a 898422495
|a 899277600
|
020 |
|
|
|a 9780128027530
|q electronic bk.
|
020 |
|
|
|a 0128027533
|q electronic bk.
|
020 |
|
|
|z 9780128027318
|q (paperback)
|
020 |
|
|
|z 0128027312
|q (paperback)
|
035 |
|
|
|a (OCoLC)900652367
|z (OCoLC)898422495
|z (OCoLC)899277600
|
037 |
|
|
|a CL0500000538
|b Safari Books Online
|
037 |
|
|
|a 9BDCCB91-8EE4-4940-9D96-C9D92BE50A84
|b OverDrive, Inc.
|n http://www.overdrive.com
|
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d WAU
|d EBLCP
|d N$T
|d OPELS
|d YDXCP
|d TEFOD
|d OCLCF
|d COO
|d DEBBG
|d B24X7
|d DEBSZ
|d TEFOD
|d ELW
|d OSU
|d UAB
|d LIV
|d MERUC
|
049 |
|
|
|a COM6
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Dalziel, Henry,
|e author.
|
245 |
1 |
0 |
|a How to defeat advanced malware :
|b new tools for protection and forensics /
|c Henry Dalziel.
|
246 |
3 |
0 |
|a New tools for protection and forensics.
|
264 |
|
1 |
|a Waltham, MA :
|b Elsevier, Syngress,
|c [2015]
|
264 |
|
4 |
|c ©2015.
|
300 |
|
|
|a 1 online resource (vi, 43 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent.
|
337 |
|
|
|a computer
|b c
|2 rdamedia.
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier.
|
520 |
|
|
|a How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a ch. 1. A primer on detection for security : 1.1 Today's approach: "compromise-first detection" -- ch. 2. 2014 Endpoint exploitation trends : 2.1 Zero-day trends -- 2.2 Notable zero-day exploitation techniques -- 2.3 Emerging zero-day exploitation techniques -- ch. 3. The proposed solution : 3.1 The principle of least priviledge ; 3.2 Detection's folly -- ch. 4. Protection's weak link : 4.1 Desktop virtualization does not secure the Endpoint -- 4.2 Detection and isolation using VMs -- ch. 5. Micro-Virtualization : 5.1 Related work ; 5.2 A practical example ; 5.3 Hardware-enforced task isolation ; 5.4 Hardware virtulization technology ; 5.5 Micro-virtualization at work ; 5.6 The microvisor ; 5.7 Memory and CPU isolation ; 5.8 Virtualized file system (VFS) ; 5.9 Virtualized IP Networking - the mobile SDN ; 5.10 Virtualized desktop services ; 5.11 Creation and management of Micro-VMs ; 5.12 Reducing the attack surface -- ch. 6. Advanced forensics and analysis : 6.1 Micro-VM behavioral analysis ; 6.2 Advanced live forensics ; 6.3 LAVA architecture ; 6.4 Conclusion.
|
588 |
|
|
|a Description based on print version record.
|
590 |
|
|
|a Elsevier
|b ScienceDirect All Books.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Malware (Computer software)
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast.
|
650 |
|
7 |
|a Malware (Computer software)
|2 fast.
|
655 |
|
0 |
|a Electronic books.
|
710 |
2 |
|
|a ScienceDirect (Online service)
|
776 |
0 |
8 |
|i Print version:
|t How to Defeat Advanced Malware.
|d Syngress Media Inc 2014
|z 9780128027318
|w (OCoLC)898162246.
|
907 |
|
|
|a .b49862546
|b multi
|c -
|d 160302
|e 230104
|
998 |
|
|
|a cue
|a cu
|b 180626
|c m
|d z
|e -
|f eng
|g mau
|h 0
|i 2
|
948 |
|
|
|a MARCIVE Comp, in 2023.01
|
948 |
|
|
|a MARCIVE Comp, 2019.12
|
948 |
|
|
|a MARCIVE Q2, 2018
|
948 |
|
|
|a MARCIVE Comp, 2018.05
|
948 |
|
|
|a MARCIVE August, 2017
|
948 |
|
|
|a MARCIVE extract Aug 5, 2017
|
994 |
|
|
|a 92
|b COM
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2023.01
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2019.12
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2018.08
|
995 |
0 |
0 |
|a OCLC offline update by CMU and loaded with m2btab.elec in 2018.06
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2018.06
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2017.09
|
995 |
|
|
|a Loaded with m2btab.netlib2 in 2016
|
989 |
|
|
|d cueme
|e - -
|f - -
|g j
|h 0
|i 0
|j 188
|k 180626
|l $0.00
|m
|n - -
|o -
|p 0
|q 0
|t 0
|x 0
|w Elsevier
|1 .i119659165
|u http://ezproxy.coloradomesa.edu/login?url=https://www.sciencedirect.com/science/book/9780128027318
|3 Elsevier
|z Click here for access
|