Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AVIEN Malware Defense Guide for the Enterprise

Buy
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you.

AVIENs sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature.

* Customer Power takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist.

* Stalkers on Your Desktop considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today.

* A Tangled Web discusses threats and countermeasures in the context of the World Wide Web.

* Big Bad Bots tackles bots and botnets, arguably Public Cyber-Enemy Number One.

* Crème de la CyberCrime takes readers into the underworld of old-school virus writing, criminal business models, and predicting future malware hotspots.

* Defense in Depth takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies.

* Perilous Outsorcery offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it.

* Education in Education offers some insights into user education from an educationalists perspective, and looks at various aspects of security in schools and other educational
establishments.

* DIY Malware Analysis is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools.

* Antivirus Evaluation & Testing continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software.

* AVIEN & AVIEWS: the Future looks at future developments in AVIEN and AVIEWS.

About the Author

David Harley (BA, CISSP) has written or contributed to over a dozen security books, including Viruses Revealed and the forthcoming AVIEN Malware Defense Guide for the Enterprise. He is an experienced and well-respected antivirus researcher, and he also holds qualifications in security audit (BS7799 Lead Auditor), ITIL Service Management, and medical informatics. His background includes security analysis for a major medical research charity and managing the Threat Assessment Centre for the U.K.s National Health Service, specializing in the management of malware and e-mail security. His Small Blue-Green World provides consultancy and authoring services to the security industry, and he is a frequent speaker at security conferences.
(HTML tags aren't allowed.)

Survey of Operating Systems
Survey of Operating Systems

Holcombe, "Survey of Operating Systems, 3e" is 'your foundation for IT Success!' McGraw-Hill is proud to introduce the third edition of Jane and Charles Holcombe's, "Survey of Operating Systems". This edition is a unique revision of the successful previous editions. Every chapter has been updated to include...

Delphi High Performance: Build fast Delphi applications using concurrency, parallel programming and memory management
Delphi High Performance: Build fast Delphi applications using concurrency, parallel programming and memory management

Build fast, scalable, and high performing applications with Delphi

Key Features

  • Build efficient and concurrent applications in Delphi with focused examples
  • Identify performance bottlenecks and apply the correct algorithm to increase the performance of applications.
  • ...
Sams Teach Yourself Samba in 24 Hours
Sams Teach Yourself Samba in 24 Hours
Sams Teach Yourself Samba in 24 Hours is a tutorial designed to help you integrate Linux/UNIX-based systems with Windows-based systems. It has all the information and tools necessary for you to be up and running with Samba in 24 short lessons. Learn how to use Samba to its fullest potential. Topics range from introducing Samba and Samba...

GUI Bloopers 2.0: Common User Interface Design Don'ts and Dos
GUI Bloopers 2.0: Common User Interface Design Don'ts and Dos
The first edition of this book was written in 1998 and 1999. The common application platforms then were MacOS9, Windows98, Windows NT, early versions of Java Swing, and Unix or Linux with CDE/Motif. Although many of the bloopers covered in the first edition are as common now as they were in the late 1990s, the book was starting to look out of date...
Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime
Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime

We all know that society is less than perfect and that crime could easily touch us all. If yon talk to friends and neighbours you will usually find that most of them have cither been the victim of crime or know somebody who has. People tear crime, they feel helpless because they think that there is nothing they can do to protect themselves,...

Principles and Practice of Constraint Programming - CP 2006: 12th International Conference
Principles and Practice of Constraint Programming - CP 2006: 12th International Conference

The 12th International Conference on the Principles and Practice of Constraint Programming (CP 2006) was held in Nantes, France, September 24–29, 2006. Information about the conference can be found on theWeb at http://www.sciences. univ-nantes.fr/cp06/. Information about past conferences in the series can be found at...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy