Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
3Se c t i o n
Se c u r i t y
P
r o d u c t S
By now, there have been extensive comments from industry experts
about some of the security products in active business usage and how
some of them oer little or no return on investment.
John Viega’s comments on antivirus products in his book, e
Myths of Security are succinct and based on reason and his own per-
sonal experiences as an employee of McAfee (now Intel—one of the
more famous antivirus software vendors), and I certainly cannot nd
any dierences with what he has to say. Even if issues such as perfor-
mance (CPU and memory hits) can be addressed, it is clear that the
advanced persistent threat world is moving too fast for pattern-based
recognition, and the “heuristic” features of ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355