6 Malware also Needs “Attention” | part of Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II | River Publishers books | IEEE Xplore