Cargando…

How to defeat advanced malware : new tools for protection and forensics /

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by B...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Dalziel, Henry (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Elsevier, Syngress, [2015]
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn900652367
003 OCoLC
005 20240329122006.0
006 m o d
007 cr mn|||||||||
008 150123t20152015maua ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d WAU  |d EBLCP  |d N$T  |d OPELS  |d YDXCP  |d TEFOD  |d OCLCF  |d COO  |d DEBBG  |d B24X7  |d DEBSZ  |d TEFOD  |d ELW  |d OSU  |d UAB  |d LIV  |d MERUC  |d WRM  |d U3W  |d D6H  |d OCLCQ  |d CEF  |d DEHBZ  |d OCLCQ  |d CUY  |d LOA  |d ZCU  |d G3B  |d CNCEN  |d S8J  |d ICG  |d K6U  |d COCUF  |d CNNOR  |d VT2  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d INARC  |d OCLCO  |d OCLCL 
019 |a 898422495  |a 899277600  |a 1391572630 
020 |a 9780128027530  |q (electronic bk.) 
020 |a 0128027533  |q (electronic bk.) 
020 |z 9780128027318  |q (paperback) 
020 |z 0128027312  |q (paperback) 
029 1 |a AU@  |b 000056062987 
029 1 |a CHNEW  |b 001012701 
029 1 |a DEBBG  |b BV042490927 
029 1 |a DEBBG  |b BV043615717 
029 1 |a DEBSZ  |b 431869243 
029 1 |a DEBSZ  |b 434841048 
029 1 |a DEBSZ  |b 446183431 
029 1 |a DEBSZ  |b 453673147 
029 1 |a AU@  |b 000060910596 
035 |a (OCoLC)900652367  |z (OCoLC)898422495  |z (OCoLC)899277600  |z (OCoLC)1391572630 
037 |a CL0500000538  |b Safari Books Online 
037 |a 9BDCCB91-8EE4-4940-9D96-C9D92BE50A84  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Dalziel, Henry,  |e author. 
245 1 0 |a How to defeat advanced malware :  |b new tools for protection and forensics /  |c Henry Dalziel. 
246 3 0 |a New tools for protection and forensics 
264 1 |a Waltham, MA :  |b Elsevier, Syngress,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (vi, 43 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. 
504 |a Includes bibliographical references. 
505 0 |a ch. 1. A primer on detection for security : 1.1 Today's approach: "compromise-first detection" -- ch. 2. 2014 Endpoint exploitation trends : 2.1 Zero-day trends -- 2.2 Notable zero-day exploitation techniques -- 2.3 Emerging zero-day exploitation techniques -- ch. 3. The proposed solution : 3.1 The principle of least priviledge ; 3.2 Detection's folly -- ch. 4. Protection's weak link : 4.1 Desktop virtualization does not secure the Endpoint -- 4.2 Detection and isolation using VMs -- ch. 5. Micro-Virtualization : 5.1 Related work ; 5.2 A practical example ; 5.3 Hardware-enforced task isolation ; 5.4 Hardware virtulization technology ; 5.5 Micro-virtualization at work ; 5.6 The microvisor ; 5.7 Memory and CPU isolation ; 5.8 Virtualized file system (VFS) ; 5.9 Virtualized IP Networking -- the mobile SDN ; 5.10 Virtualized desktop services ; 5.11 Creation and management of Micro-VMs ; 5.12 Reducing the attack surface -- ch. 6. Advanced forensics and analysis : 6.1 Micro-VM behavioral analysis ; 6.2 Advanced live forensics ; 6.3 LAVA architecture ; 6.4 Conclusion. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Malware (Computer software) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Logiciels malveillants. 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Malware (Computer software)  |2 fast 
758 |i has work:  |a How to defeat advanced malware (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFy3vtJ3QJYwDfcTYCxQ7b  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t How to Defeat Advanced Malware.  |d Syngress Media Inc 2014  |z 9780128027318  |w (OCoLC)898162246 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1888756  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128027318/?ar  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00078689 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1888756 
938 |a EBSCOhost  |b EBSC  |n 924922 
938 |a YBP Library Services  |b YANK  |n 12206727 
938 |a Internet Archive  |b INAR  |n howtodefeatadvan0000dalz 
994 |a 92  |b IZTAP