• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
AVIEN malware defense guide for the Enterprise /

پدید آورنده
David Harley [and others] ; foreword by Robert S. Vibert.

موضوع
Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

رده
QA76
.
9
.
A25
A873
2007eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0080558666
(Number (ISBN
1597491640
(Number (ISBN
9780080558660
(Number (ISBN
9781597491648

NATIONAL BIBLIOGRAPHY NUMBER

Number
b715917

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
AVIEN malware defense guide for the Enterprise /
General Material Designation
[Book]
First Statement of Responsibility
David Harley [and others] ; foreword by Robert S. Vibert.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Burlington, MA :
Name of Publisher, Distributor, etc.
Syngress,
Date of Publication, Distribution, etc.
2007.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xxxv, 540 pages) :
Other Physical Details
illustrations

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references (pages 503-515) and index.

CONTENTS NOTE

Text of Note
Front Cover; AVIEN Malware Defense Guide for the Enterprise; Copyright Page; Lead Author and Technical Editor; Foreword Author; Contributors; Contents; Foreword; Preface; Introduction; Chapter 1: Customer Power and AV Wannabes; Chapter 2: Stalkers on Your Desktop; Chapter 3: A Tangled Web; Chapter 4: Big Bad Botnets; Chapter 5: Cregraveme de la Cybercrime; Chapter 6: Defense-in-depth; Chapter 7: Perilous Outsorcery; Chapter 8: Education in Education; Chapter 9: DIY Malware Analysis; Chapter 10: Antimalware Evaluation and Testing; Chapter 11: AVIEN and AVIEWS: the Future; Appendix A: Resources.
0

SUMMARY OR ABSTRACT

Text of Note
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIENs sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature. * Customer Power takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist. * Stalkers on Your Desktop considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today. * A Tangled Web discusses threats and countermeasures in the context of the World Wide Web. * Big Bad Bots tackles bots and botnets, arguably Public Cyber-Enemy Number One. * Cr̈me de la CyberCrime takes readers into the underworld of old-school virus writing, criminal business models, and predicting future malware hotspots. * Defense in Depth takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies. * Perilous Outsorcery offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it. * Education in Education offers some insights into user education from an educationalists perspective, and looks at various aspects of security in schools and other educational establishments. * DIY Malware Analysis is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools. * Antivirus Evaluation & Testing continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software. * AVIEN & AVIEWS: the Future looks at future developments in AVIEN and AVIEWS.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Elsevier Science & Technology
Stock Number
141529:141673

OTHER EDITION IN ANOTHER MEDIUM

Title
AVIEN malware defense guide for the Enterprise.
International Standard Book Number
1597491640

PARALLEL TITLE PROPER

Parallel Title
Anti-Virus Information Exchange Network malware defense guide for the Enterprise

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures.
Computer security-- Management.
Computer viruses.
Computer networks-- Security measures.
Computer security-- Management.
Computer viruses.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.

(SUBJECT CATEGORY (Provisional

COM-- 043050
COM-- 053000
COM-- 060040

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
A873
2007eb

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Harley, David.

ORIGINATING SOURCE

Date of Transaction
20201208060718.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival