語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Ransomware revealeda beginner's guid...
~
Hassan, Nihad A.
Ransomware revealeda beginner's guide to protecting and recovering from ransomware attacks /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Ransomware revealedby Nihad A. Hassan.
其他題名:
a beginner's guide to protecting and recovering from ransomware attacks /
作者:
Hassan, Nihad A.
出版者:
Berkeley, CA :Apress :2019.
面頁冊數:
xx, 218 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Malware (Computer software)Congresses.
電子資源:
https://doi.org/10.1007/978-1-4842-4255-1
ISBN:
9781484242551$q(electronic bk.)
Ransomware revealeda beginner's guide to protecting and recovering from ransomware attacks /
Hassan, Nihad A.
Ransomware revealed
a beginner's guide to protecting and recovering from ransomware attacks /[electronic resource] :by Nihad A. Hassan. - Berkeley, CA :Apress :2019. - xx, 218 p. :ill., digital ;24 cm.
Part 1: Introduction to Ransomware Threats -- Chapter 1: Ransomware Overview -- Chapter 2: Ransomware Distribution Methods -- Chapter 3: Ransomware Families -- Part 2: Ransomware Mitigation Strategies -- Chapter 4: Endpoint Defense Strategies -- Chapter 5: Enterprise Defense Strategies against Ransomware Attacks -- Chapter 6: Security Awareness Training -- Part 3: Dealing with Ransomware Incidents -- Chapter 7: Paying the Ransom -- Chapter 8: Ransomware Decryption Tools -- Chapter 9: Responding to Ransomware Attacks.
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly. Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today-the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future. Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems. You will: Be aware of how ransomware infects your system Comprehend ransomware components in simple terms Recognize the different types of ransomware families Identify the attack vectors employed by ransomware to infect computer systems Know how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies) Know what to do if a successful ransomware infection takes place Understand how to pay the ransom as well as the pros and cons of paying Set up a ransomware response plan to recover from such attacks.
ISBN: 9781484242551$q(electronic bk.)
Standard No.: 10.1007/978-1-4842-4255-1doiSubjects--Topical Terms:
451427
Malware (Computer software)
--Congresses.
LC Class. No.: QA76.76.C68 / H37 2019
Dewey Class. No.: 005.88
Ransomware revealeda beginner's guide to protecting and recovering from ransomware attacks /
LDR
:03672nmm a2200325 a 4500
001
569732
003
DE-He213
005
20191106142153.0
006
m d
007
cr nn 008maaau
008
200723s2019 cau s 0 eng d
020
$a
9781484242551$q(electronic bk.)
020
$a
9781484242544$q(paper)
024
7
$a
10.1007/978-1-4842-4255-1
$2
doi
035
$a
978-1-4842-4255-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.76.C68
$b
H37 2019
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.88
$2
23
090
$a
QA76.76.C68
$b
H353 2019
100
1
$a
Hassan, Nihad A.
$3
789889
245
1 0
$a
Ransomware revealed
$h
[electronic resource] :
$b
a beginner's guide to protecting and recovering from ransomware attacks /
$c
by Nihad A. Hassan.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
xx, 218 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part 1: Introduction to Ransomware Threats -- Chapter 1: Ransomware Overview -- Chapter 2: Ransomware Distribution Methods -- Chapter 3: Ransomware Families -- Part 2: Ransomware Mitigation Strategies -- Chapter 4: Endpoint Defense Strategies -- Chapter 5: Enterprise Defense Strategies against Ransomware Attacks -- Chapter 6: Security Awareness Training -- Part 3: Dealing with Ransomware Incidents -- Chapter 7: Paying the Ransom -- Chapter 8: Ransomware Decryption Tools -- Chapter 9: Responding to Ransomware Attacks.
520
$a
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly. Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today-the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future. Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems. You will: Be aware of how ransomware infects your system Comprehend ransomware components in simple terms Recognize the different types of ransomware families Identify the attack vectors employed by ransomware to infect computer systems Know how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies) Know what to do if a successful ransomware infection takes place Understand how to pay the ransom as well as the pros and cons of paying Set up a ransomware response plan to recover from such attacks.
650
0
$a
Malware (Computer software)
$v
Congresses.
$3
451427
650
0
$a
Computer security.
$3
184416
650
0
$a
Computer crimes
$x
Prevention.
$3
317273
650
1 4
$a
Security.
$3
760527
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-4255-1
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000177793
電子館藏
1圖書
電子書
EB QA76.76.C68 H353 2019 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-1-4842-4255-1
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入