Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AVIEN Malware Defense Guide for the Enterprise

Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you.

AVIENs sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature.

* Customer Power takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist.

* Stalkers on Your Desktop considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today.

* A Tangled Web discusses threats and countermeasures in the context of the World Wide Web.

* Big Bad Bots tackles bots and botnets, arguably Public Cyber-Enemy Number One.

* Crème de la CyberCrime takes readers into the underworld of old-school virus writing, criminal business models, and predicting future malware hotspots.

* Defense in Depth takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies.

* Perilous Outsorcery offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it.

* Education in Education offers some insights into user education from an educationalists perspective, and looks at various aspects of security in schools and other educational

* DIY Malware Analysis is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools.

* Antivirus Evaluation & Testing continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software.

* AVIEN & AVIEWS: the Future looks at future developments in AVIEN and AVIEWS.

About the Author

David Harley (BA, CISSP) has written or contributed to over a dozen security books, including Viruses Revealed and the forthcoming AVIEN Malware Defense Guide for the Enterprise. He is an experienced and well-respected antivirus researcher, and he also holds qualifications in security audit (BS7799 Lead Auditor), ITIL Service Management, and medical informatics. His background includes security analysis for a major medical research charity and managing the Threat Assessment Centre for the U.K.s National Health Service, specializing in the management of malware and e-mail security. His Small Blue-Green World provides consultancy and authoring services to the security industry, and he is a frequent speaker at security conferences.
(HTML tags aren't allowed.)

Buying a Computer for Dummies, 2005 Edition
Buying a Computer for Dummies, 2005 Edition
CPU, Ghz, Mhz, DIMMS, RAM, ROM, AGP, ISA, PCI, USB, CRT, LCD, NIC, CCD, CIS, DP, Kbps. What do all of these acronyms mean?

Are you baffled by computer technology and technology? Intimidated by computer salespeople who grimace or grin when you say “gizmo?” Buying a Computer For Dummies 2005 Edition gives you the ABCs of...

Developing an Online Curriculum: Technologies and Techniques
Developing an Online Curriculum: Technologies and Techniques
The information in the following chapters has been designed for university
or college teachers who are or will become involved with online
education. The emphasis is on teachers, because they are working in the
front lines of online education. You throughout the text refers to teachers.
However, administrators, course designers,
Excel 2010 for Biological and Life Sciences Statistics: A Guide to Solving Practical Problems
Excel 2010 for Biological and Life Sciences Statistics: A Guide to Solving Practical Problems

This is the first book to show the capabilities of Microsoft Excel to teach biological and life sciences statistics effectively.  It is a step-by-step exercise-driven guide for students and practitioners who need to master Excel to solve practical science problems.  If understanding statistics isn’t your strongest suit, you...

Disciplined Entrepreneurship Workbook
Disciplined Entrepreneurship Workbook

The essential companion to the book that revolutionized entrepreneurship

Disciplined Entrepreneurship Workbook provides a practical manual for working the 24-step framework presented in Disciplined Entrepreneurship. Unlocking key lessons and breaking down the steps, this book helps you delve deeper into the...

Joomla! 3 Beginner's Guide
Joomla! 3 Beginner's Guide

Even if you've never even begun to build a website, this guide will have you completing one within an hour. It's a fast, practical, fun introduction to Joomla! and content managed website creation.


  • Create a Joomla! website in an hour with the help of easy-to-follow steps and...
Beginning Portable Shell Scripting: From Novice to Professional (Expert's Voice in Open Source)
Beginning Portable Shell Scripting: From Novice to Professional (Expert's Voice in Open Source)
Portable shell scripting is today the future of modern Linux, OS X, and Unix command–line access. Beginning Portable Shell Scripting: From Novice to Professional teaches shell scripting by using the common core of most shells and expands those principles to all of scripting.

You will learn about portable scripting and how to use...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy