Protection’s Weak Link
Abstract
A selection of existing defensive security technologies are analyzed, including antivirus systems, host intrusion prevention systems, desktop firewalls, desktop virtualization systems, patch management solutions, and application whitelisting solutions.
Keywords
Get How to Defeat Advanced Malware now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.