Table of Contents
Chapter 1: A Primer on Detection for Security
1.1. Today’s approach: “compromise-first detection”
Chapter 2: 2014 Endpoint Exploitation Trends
2.2. Notable zero-day exploitation techniques
2.3. Emerging zero-day exploitation techniques
Chapter 3: The Proposed Solution
3.1. The principle of least privilege
Chapter 4: Protection’s Weak Link
4.1. Desktop virtualization does not secure the endpoint
4.2. Detection and isolation using VMs
Chapter 5: Micro-Virtualization
Get How to Defeat Advanced Malware now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.