Atjaunināt sīkdatņu piekrišanu

Ransomware: Penetration Testing and Contingency Planning [Hardback]

(President, HTG Solutions, IL, USA)
  • Formāts: Hardback, 122 pages, height x width: 234x156 mm, weight: 340 g, 16 Tables, black and white; 9 Line drawings, black and white; 10 Halftones, black and white; 19 Illustrations, black and white
  • Sērija : Cyber Shorts
  • Izdošanas datums: 21-Dec-2023
  • Izdevniecība: CRC Press
  • ISBN-10: 1032556676
  • ISBN-13: 9781032556673
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 158,75 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Bibliotēkām
  • Formāts: Hardback, 122 pages, height x width: 234x156 mm, weight: 340 g, 16 Tables, black and white; 9 Line drawings, black and white; 10 Halftones, black and white; 19 Illustrations, black and white
  • Sērija : Cyber Shorts
  • Izdošanas datums: 21-Dec-2023
  • Izdevniecība: CRC Press
  • ISBN-10: 1032556676
  • ISBN-13: 9781032556673
Citas grāmatas par šo tēmu:

Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author provides an overview of what Ransomware is all about, and the timeline of its evolution.



Ransomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, ransomware attacks have become much more covert and stealthier than when they first came out. In this book, the author provides an overview of ransomware and the timeline of its evolution.

The author also discusses famous ransomware attacks that have occurred, with a special focus on SolarWinds and critical infrastructure before taking a deep dive into penetration testing and how it can be used to mitigate the risks of a ransomware attack from happening. The author also covers incident response, disaster recovery, and business continuity planning. We even look at an appropriate data backup plan as well.

Acknowledgment. Introduction.
Chapter 1 The History of Ransomware.
Chapter 2 A Technical Review of Ransomware Attacks.
Chapter 3 The Importance of Penetration Testing.
Chapter 4 How to Recover from a Ransomware Attack.
Chapter 5 Conclusions. INDEX.

Ravindra Das is a technical writer in the cybersecurity realm. He does cybersecurity consulting on the side through his private practice, RaviDas.Tech, Inc. He also holds the Certified in Cybersecurity certification from the ISC2.