CHAPTER 11
Mitigating the Threat
|
We’ll Cover
What is threat mitigation
The stages of malware threat handling
How to immediately and proactively mitigate a threat
Common policies included in a safe computing process
The importance of conducting ...
Get Malware, Rootkits & Botnets A Beginner's Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.