AVIEN Malware Defense Guide for the Enterprise

David Harley, Ken Bechtel, Michael Blanchard, Henk K. Diemer, Andrew Lee, Igor Muttik, Bojan Zdrnja

  • 出版商: Syngress
  • 出版日期: 2007-08-05
  • 定價: $2,040
  • 售價: 1.0$199
  • 語言: 英文
  • 頁數: 656
  • 裝訂: Paperback
  • ISBN: 1597491640
  • ISBN-13: 9781597491648

限量商品 (庫存=2)



This guide to managing malicious software within the enterprise is a unique collaboration between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators who use those technologies in real life. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you.

Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the dissemination of information about new threats at a speed that few anti-virus companies were able to match. The subsequent formation of AVIEWS, AVIEN's sister organization resulted in a forum where these vendor-independent experts were able to collaborate and exchange information and discussion with the independent researchers and vendor representatives who know most about the internals of malware and anti-malware technologies.

This new book uniquely combines the knowledge of these two groups of experts. The result is a book that combines technical depth with strategic vision to a degree unparalleled in previous literature relating to malicious code, reflecting the expertise of security administrators and managers at the customer coalface and the technical and developmental expertise of the industry researchers.

AVIEN members represent the best-protected large organizations in the world, and millions of users: AVIEWS members represent some of the most able researchers and vendors in the world, and some of the most widely-used product ranges. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature.