Cargando…

Ransomware /

In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: O'Reilly (Firm) (pubisher.)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, Inc., [2022]
Edición:[First edition].
Colección:Security superstream.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1312649885
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 220426s2022 xx 202 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d ORMDA  |d OCLCO  |d OCLCF 
024 8 |a 0636920702641 
035 |a (OCoLC)1312649885 
037 |a 0636920702641  |b O'Reilly Media 
050 4 |a Q325.5 
082 0 4 |a 006.31  |2 23/eng/20220426 
049 |a UAMI 
245 0 0 |a Ransomware /  |c Chloé Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b O'Reilly Media, Inc.,  |c [2022] 
300 |a 1 online resource (1 video file (3 hr., 22 min.)) :  |b sound, color. 
306 |a 032200 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
490 1 |a Security superstream 
511 0 |a Chloé, Alissa Knight, Cynthia Brumfield, Edna Conway, Keliyn Wagner Ramsdell, Laurie Iacono, presenters. 
520 |a In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pros for four hours of sessions on how to better assess threats and develop a security-aware mindset and how to detect and prevent risks and find inflection points. You'll also explore pragmatic approaches for recovering files without paying a ransom, defending against and responding to attacks, handling pitfalls if you do pay, and more. What you'll learn and how you can apply it Explore the fundamentals of security, including how to improve security within your organization Learn the key characteristics of ransomware attacks and how to assess potential security risks Understand the protection strategies and remediation plans for ransomware attacks that should be in place ahead of time This recording of a live event is for you because... You're a security practitioner interested in combating ransomware. You're a developer new to or looking to enter a security role. You're the incident response plan owner for your organization. You want to become well-versed in the foundations and best practices of security. You want to learn about ransomware. You want to get started with bug hunting. Recommended follow-up: Read: Ransomware Protection Playbook (book) Watch: Ransomware (video). 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed April 26, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Malware (Computer software) 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Logiciels malveillants. 
650 7 |a Computer crimes  |x Prevention.  |2 fast  |0 (OCoLC)fst00872068 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Malware (Computer software)  |2 fast  |0 (OCoLC)fst01748230 
655 2 |a Webcast 
655 7 |a Instructional films.  |2 fast  |0 (OCoLC)fst01726236 
655 7 |a Internet videos.  |2 fast  |0 (OCoLC)fst01750214 
655 7 |a Nonfiction films.  |2 fast  |0 (OCoLC)fst01710269 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Messdaghi, Chloé,  |e presenter. 
700 1 |a Knight, Alissa,  |e presenter. 
700 1 |a Brumfield, Cynthia,  |e presenter. 
700 1 |a Conway, Edna,  |e presenter. 
700 1 |a Ramsdell, Kellyn Wagner,  |e presenter. 
700 1 |a Iacono, Laurie,  |e presenter. 
710 2 |a O'Reilly (Firm),  |e pubisher. 
830 0 |a Security superstream. 
856 4 0 |u https://learning.oreilly.com/videos/~/0636920702641/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP