How to Defeat Advanced Malware: New Tools for Protection and Forensics (2015)

How to Defeat Advanced Malware: New Tools for Protection and Forensics (2015)

Chapter 1. A Primer on Detection for Security

Chapter 2. 2014 Endpoint Exploitation Trends

Chapter 3. The Proposed Solution

Chapter 4. Protection’s Weak Link

Chapter 5. Micro-Virtualization

Chapter 6. Advanced Forensics and Analysis