| 000 | 02313cam a2200361 i 4500 | ||
|---|---|---|---|
| 001 | on1390876347 | ||
| 003 | OCoLC | ||
| 005 | 20250814144022.0 | ||
| 008 | 230724t20242024flua 001 0 eng d | ||
| 020 | _a9781032556697 | ||
| 035 |
_a(OCoLC)1390876347 _z(OCoLC)1390875198 |
||
| 040 |
_aYDX _beng _erda _cEG-NcFUE _dOCLCO _dYDX |
||
| 050 | 4 |
_aQA76.9.A25 _bD37 2024 |
|
| 082 | 0 | 4 |
_a005.8 D.R.R _223 |
| 100 | 1 |
_aDas, Ravindra, _eauthor. |
|
| 245 | 1 | 0 |
_aRansomware : _bPenetration testing and contingency planning / _cRavindra Das. |
| 250 | _aFirst edition. | ||
| 264 | 1 |
_aBoca Raton, FL : _bCRC Press, _c2024. |
|
| 264 | 4 | _c©2024 | |
| 300 |
_aix, 121 pages : _billustrations ; _c24 cm. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 490 | 0 | _aCyber shorts series | |
| 500 | _aIncludes index. | ||
| 505 | 0 | _a1. Introduction 2. A Technical Review of Ransomware Attacks 3. The Importance of Penetration Testing 4. How to Recover from a Ransomware Attack 5. Conclusion | |
| 520 | _aRansomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, ransomware attacks have become much more covert and stealthier than when they first came out. In this book, the author provides an overview of ransomware and the timeline of its evolution. The author also discusses famous ransomware attacks that have occurred, with a special focus on SolarWinds and critical infrastructure before taking a deep dive into penetration testing and how it can be used to mitigate the risks of a ransomware attack from happening. The author also covers incident response, disaster recovery, and business continuity planning. We even look at an appropriate data backup plan as well. | ||
| 545 | 0 | _aRavindra Das is a technical writer in the cybersecurity realm. He does cybersecurity consulting on the side through his private practice, RaviDas.Tech, Inc. He also holds the Certified in Cybersecurity certification from the ISC2. | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 | _aMalware (Computer software) | |
| 942 |
_2ddc _cBK |
||
| 949 |
_tNONCIRC _l_ULDEMAND _mI-UNIVLIB _o.PUBLIC. Books on Demand service for IUPUI University Library users only _o.PUBLIC. Click the “Get this for IUPUI” button to submit a request. |
||
| 999 |
_c13388 _d13388 |
||