Ransomware /
In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pr...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | O'Reilly (Firm) (pubisher.) |
Formato: | Electrónico Video |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
O'Reilly Media, Inc.,
[2022]
|
Edición: | [First edition]. |
Colección: | Security superstream.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks /
por: Hassan, Nihad A.
Publicado: (2019) -
Rootkits and bootkits : reversing modern malware and next generation threats /
por: Matrosov, Alex, et al.
Publicado: (2019) -
The Ransomware Threat Landscape : Prepare for, Recognise and Survive Ransomware Attacks.
por: Calder, Alan
Publicado: (2021) -
Introduction to malware analysis for incident responders /
Publicado: (2018) -
Advanced malware analysis /
Publicado: (2018)