How to Defeat Advanced Malware - 1st Edition - ISBN: 9780128027318, 9780128027530

How to Defeat Advanced Malware

1st Edition

New Tools for Protection and Forensics

Editors: Simon Crosby
Authors: Henry Dalziel
eBook ISBN: 9780128027530
Paperback ISBN: 9780128027318
Imprint: Syngress
Published Date: 10th December 2014
Page Count: 50
Tax/VAT will be calculated at check-out Price includes VAT (GST)
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
31.95
22.36
22.36
22.36
22.36
22.36
25.56
25.56
24.99
17.49
17.49
17.49
17.49
17.49
19.99
19.99
39.95
27.96
27.96
27.96
27.96
27.96
31.96
31.96
Unavailable
Price includes VAT (GST)
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.

This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection.

How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

Key Features

  • Learn the basics of protecting your company's online-accessible assets
  • Discover strategies that take advantage of micro-virtualization and BYOD
  • Become adept at comparing and utilizing different endpoint security products and strategies

Readership

information security professionals, consultants, network administrators, CIOs, CTOs, CISOs

Table of Contents

  • Author Biography
  • Contributing Editor Biography
  • Chapter 1: A Primer on Detection for Security
    • Abstract
    • 1.1. Today’s approach: “compromise-first detection”
  • Chapter 2: 2014 Endpoint Exploitation Trends
    • Abstract
    • 2.1. Zero-day trends
    • 2.2. Notable zero-day exploitation techniques
    • 2.3. Emerging zero-day exploitation techniques
  • Chapter 3: The Proposed Solution
    • Abstract
    • 3.1. The principle of least privilege
    • 3.2. Detection’s folly
  • Chapter 4: Protection’s Weak Link
    • Abstract
    • 4.1. Desktop virtualization does not secure the endpoint
    • 4.2. Detection and isolation using VMs
  • Chapter 5: Micro-Virtualization
    • Abstract
    • 5.1. Related work
    • 5.2. A practical example
    • 5.3. Hardware-enforced task isolation
    • 5.4. Hardware virtualization technology
    • 5.5. Micro-virtualization at work
    • 5.6. The microvisor
    • 5.7. Memory and CPU isolation
    • 5.8. Virtualized file system (VFS)
    • 5.9. Virtualized IP networking – the mobile SDN
    • 5.10. Virtualized desktop services
    • 5.11. Creation and management of micro-VMs
    • 5.12. Reducing the attack surface
  • Chapter 6: Advanced Forensics and Analysis
    • Abstract
    • 6.1. Micro-VM behavioral analysis
    • 6.2. Advanced live forensics
    • 6.3. LAVA architecture
    • 6.4. Conclusion

Details

No. of pages:
50
Language:
English
Copyright:
© Syngress 2015
Published:
Imprint:
Syngress
eBook ISBN:
9780128027530
Paperback ISBN:
9780128027318

About the Editor

Simon Crosby

Simon Crosby is Co–founder and CTO at Bromium and Bromium Labs. The Bromium Labs team of security analysts has extensive experience in building innovative technologies to counter and defend against advanced attacks. While Bromium has created an innovative new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

Affiliations and Expertise

Co-founder and CTO at Bromium and Bromium Labs. California, United States.

About the Author

Henry Dalziel

Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).

Affiliations and Expertise

Founder, Concise Ac Ltd, UK