
How to Defeat Advanced Malware
New Tools for Protection and Forensics
- Publisher's listprice EUR 31.95
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 1 355 Ft off)
- Discounted price 12 197 Ft (11 616 Ft + 5% VAT)
13 553 Ft
Availability
printed on demand
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher Syngress
- Date of Publication 9 January 2015
- ISBN 9780128027318
- Binding Paperback
- No. of pages50 pages
- Size 228x152 mm
- Weight 90 g
- Language English 0
Categories
Long description:
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.
This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection.
How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.
MoreTable of Contents:
Chapter 1: A Primer on Detection for Security
Chapter 2: 2014 Endpoint Exploitation Trends
Chapter 3: A Proposed Solution
Chapter 4: Protection's Weak Link
Chapter 5: Micro-virtualization
More