Chapter 1: A Primer on Detection for Security
1.1. Today’s approach: “compromise-first detection”
Chapter 2: 2014 Endpoint Exploitation Trends
2.2. Notable zero-day exploitation techniques
2.3. Emerging zero-day exploitation techniques
Chapter 3: The Proposed Solution
3.1. The principle of least privilege
Chapter 4: Protection’s Weak Link
4.1. Desktop virtualization does not secure the endpoint
4.2. Detection and isolation using VMs
Chapter 5: Micro-Virtualization
5.3. Hardware-enforced task isolation
5.4. Hardware virtualization technology
5.5. Micro-virtualization at work
5.8. Virtualized file system (VFS)
5.9. Virtualized IP networking – the mobile SDN
5.10. Virtualized desktop services
5.11. Creation and management of micro-VMs
5.12. Reducing the attack surface
Chapter 6: Advanced Forensics and Analysis
3.143.9.115