Ebook: How to defeat advanced malware new tools for protection and forensics
Author: Crosby Simon, Dalziel Henry
- Tags: Computer networks--Security measures, Logiciels malveillants, Malware (Computer software), Réseaux d'ordinateurs--Sécurité--Mesures, Livres électroniques, Computer networks -- Security measures, Réseaux d'ordinateurs -- Sécurité -- Mesures
- Year: 2015
- Publisher: Syngress is an imprint of Elsevier
- City: Waltham;MA;USA
- Language: English
- pdf
This is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection-based security products have become ineffective. A simple strategy is presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware-isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. It compares current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization. You will learn the basics of protecting your company's online-accessible assets; discover strategies that take advantage of micro-virtualization and BYOD; and become adept at comparing and utilizing different endpoint security products and strategies. --
Download the book How to defeat advanced malware new tools for protection and forensics for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)