000 02945nam a22004453i 4500
001 EBC1888756
003 MiAaPQ
005 20240729123250.0
006 m o d |
007 cr cnu||||||||
008 240724s2015 xx o ||||0 eng d
020 _a9780128027530
_q(electronic bk.)
020 _z9780128027318
035 _a(MiAaPQ)EBC1888756
035 _a(Au-PeEL)EBL1888756
035 _a(CaPaEBR)ebr10999743
035 _a(CaONFJC)MIL679364
035 _a(OCoLC)900652367
040 _aMiAaPQ
_beng
_erda
_epn
_cMiAaPQ
_dMiAaPQ
050 4 _a005.8 -- .D359 2015eb
082 0 _a005.84
100 1 _aDalziel, Henry.
245 1 0 _aHow to Defeat Advanced Malware :
_bNew Tools for Protection and Forensics.
250 _a1st ed.
264 1 _aSan Diego :
_bElsevier Science & Technology Books,
_c2015.
264 4 _c©2015.
300 _a1 online resource (54 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aCover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - A Primer on Detection for Security -- 1.1 Today's approach: "compromise-first detection" -- Chapter 2 - 2014 Endpoint Exploitation Trends -- 2.1 Zero-day trends -- 2.3 Emerging zero-day exploitation techniques -- Chapter 3 - The Proposed Solution -- 3.1 The principle of least privilege -- 3.2 Detection's folly -- Chapter 4 - Protection's Weak Link -- 4.1 Desktop virtualization does not secure the endpoint -- 4.2 Detection and isolation using VMs -- Chapter 5 - Micro-Virtualization -- 5.1 Related work -- 5.2 A practical example -- 5.3 Hardware-enforced task isolation -- 5.4 Hardware virtualization technology -- 5.5 Micro-virtualization at work -- 5.6 The microvisor -- 5.7 Memory and CPU isolation -- 5.8 Virtualized file system (VFS) -- 5.9 Virtualized IP networking - the mobile SDN -- 5.10 Virtualized desktop services -- 5.11 Creation and management of micro-VMs -- 5.12 Reducing the attack surface -- Chapter 6 - Advanced Forensics and Analysis -- 6.1 Micro-VM behavioral analysis -- 6.2 Advanced live forensics -- 6.3 LAVA architecture -- 6.4 Conclusion.
588 _aDescription based on publisher supplied metadata and other sources.
590 _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 0 _aMalware (Computer software).
655 4 _aElectronic books.
700 1 _aCrosby, Simon.
776 0 8 _iPrint version:
_aDalziel, Henry
_tHow to Defeat Advanced Malware
_dSan Diego : Elsevier Science & Technology Books,c2015
_z9780128027318
797 2 _aProQuest (Firm)
856 4 0 _uhttps://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1888756
_zClick to View
999 _c44380
_d44380