Part II: STRATEGIES OF THE DEFENDERChapter 11. Antivirus Defense TechniquesChapter 12. Memory Scanning and DisinfectionChapter 13. Worm-Blocking Techniques and Host-Based Intrusion PreventionChapter 14. Network-Level Defense StrategiesChapter 15. Malicious Code Analysis TechniquesChapter 16. Conclusion