CHAPTER 11
Mitigating the Threat
We’ll Cover
image  What is threat mitigation
image  The stages of malware threat handling
image  How to immediately and proactively mitigate a threat
image  Common policies included in a safe computing process
image  The importance of conducting ...

Get Malware, Rootkits & Botnets A Beginner's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.