000 | 02945nam a22004453i 4500 | ||
---|---|---|---|
001 | EBC1888756 | ||
003 | MiAaPQ | ||
005 | 20240729123250.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 240724s2015 xx o ||||0 eng d | ||
020 |
_a9780128027530 _q(electronic bk.) |
||
020 | _z9780128027318 | ||
035 | _a(MiAaPQ)EBC1888756 | ||
035 | _a(Au-PeEL)EBL1888756 | ||
035 | _a(CaPaEBR)ebr10999743 | ||
035 | _a(CaONFJC)MIL679364 | ||
035 | _a(OCoLC)900652367 | ||
040 |
_aMiAaPQ _beng _erda _epn _cMiAaPQ _dMiAaPQ |
||
050 | 4 | _a005.8 -- .D359 2015eb | |
082 | 0 | _a005.84 | |
100 | 1 | _aDalziel, Henry. | |
245 | 1 | 0 |
_aHow to Defeat Advanced Malware : _bNew Tools for Protection and Forensics. |
250 | _a1st ed. | ||
264 | 1 |
_aSan Diego : _bElsevier Science & Technology Books, _c2015. |
|
264 | 4 | _c©2015. | |
300 | _a1 online resource (54 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aCover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - A Primer on Detection for Security -- 1.1 Today's approach: "compromise-first detection" -- Chapter 2 - 2014 Endpoint Exploitation Trends -- 2.1 Zero-day trends -- 2.3 Emerging zero-day exploitation techniques -- Chapter 3 - The Proposed Solution -- 3.1 The principle of least privilege -- 3.2 Detection's folly -- Chapter 4 - Protection's Weak Link -- 4.1 Desktop virtualization does not secure the endpoint -- 4.2 Detection and isolation using VMs -- Chapter 5 - Micro-Virtualization -- 5.1 Related work -- 5.2 A practical example -- 5.3 Hardware-enforced task isolation -- 5.4 Hardware virtualization technology -- 5.5 Micro-virtualization at work -- 5.6 The microvisor -- 5.7 Memory and CPU isolation -- 5.8 Virtualized file system (VFS) -- 5.9 Virtualized IP networking - the mobile SDN -- 5.10 Virtualized desktop services -- 5.11 Creation and management of micro-VMs -- 5.12 Reducing the attack surface -- Chapter 6 - Advanced Forensics and Analysis -- 6.1 Micro-VM behavioral analysis -- 6.2 Advanced live forensics -- 6.3 LAVA architecture -- 6.4 Conclusion. | |
588 | _aDescription based on publisher supplied metadata and other sources. | ||
590 | _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
650 | 0 | _aMalware (Computer software). | |
655 | 4 | _aElectronic books. | |
700 | 1 | _aCrosby, Simon. | |
776 | 0 | 8 |
_iPrint version: _aDalziel, Henry _tHow to Defeat Advanced Malware _dSan Diego : Elsevier Science & Technology Books,c2015 _z9780128027318 |
797 | 2 | _aProQuest (Firm) | |
856 | 4 | 0 |
_uhttps://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1888756 _zClick to View |
999 |
_c44380 _d44380 |