Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.

How to Defeat Advanced Malware

ebook

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.

This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection.

How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

  • Learn the basics of protecting your company's online-accessible assets
  • Discover strategies that take advantage of micro-virtualization and BYOD
  • Become adept at comparing and utilizing different endpoint security products and strategies

  • Expand title description text
    Publisher: Elsevier Science

    Kindle Book

    • Release date: December 5, 2014

    OverDrive Read

    • ISBN: 9780128027530
    • Release date: December 5, 2014

    EPUB ebook

    • ISBN: 9780128027530
    • File size: 3257 KB
    • Release date: December 5, 2014

    Formats

    Kindle Book
    OverDrive Read
    EPUB ebook

    Languages

    English

    How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.

    This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection.

    How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

  • Learn the basics of protecting your company's online-accessible assets
  • Discover strategies that take advantage of micro-virtualization and BYOD
  • Become adept at comparing and utilizing different endpoint security products and strategies

  • Expand title description text