ABSTRACT

Let’s now leave the world of Digital Diskus and turn to a set of architectural problems that is different from securing enterprise architectures. You may remember the discussion of endpoint antivirus software from Chapter 3. Figure 9.1 diagrams a more complete set of the components that might be used within endpoint antivirus software.