Preventing Digital Extortion (notice n° 65420)

détails MARC
000 -LEADER
fixed length control field 03631cam a2200277zu 4500
003 - CONTROL NUMBER IDENTIFIER
control field FRCYB88842832
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250107215805.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250107s2017 fr | o|||||0|0|||eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781787120365
035 ## - SYSTEM CONTROL NUMBER
System control number FRCYB88842832
040 ## - CATALOGING SOURCE
Original cataloging agency FR-PaCSA
Language of cataloging en
Transcribing agency
Description conventions rda
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Thakkar, Dhanya
245 01 - TITLE STATEMENT
Title Preventing Digital Extortion
Statement of responsibility, etc. ['Thakkar, Dhanya']
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Name of producer, publisher, distributor, manufacturer Packt Publishing
Date of production, publication, distribution, manufacture, or copyright notice 2017
300 ## - PHYSICAL DESCRIPTION
Extent p.
336 ## - CONTENT TYPE
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type code c
Source rdamdedia
338 ## - CARRIER TYPE
Carrier type code c
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. Learn the art of preventing digital extortion and securing confidential dataAbout This BookGet acquainted with multiple cyber extortion attacks and techniques to mitigate themLearn how DDOS, Crypto Virus, and other cyber extortion techniques can infect your computers, smartphones, servers, and cloudA concise, fast-paced guide that develops your skills in protecting confidential data by leveraging widely used toolsWho This Book Is ForThis book targets IT security managers, IT security engineers, security analysts, and professionals who are eager to avoid digital extortion for themselves or their organizations. They may have heard of such attacks but are not aware of their various types, techniques, and business impact.What You Will LearnDelve into the various types, stages, and economics of digital extortionUnderstand the science behind different attacksUnderstand the gravity of and mechanics behind ransomware and prevent and mitigate data breaches and financial lossesUse effective tools to defend against ransomwareAnalyze attacks, the money flow, and cyber insurance processesLearn the art of preventing digital extortion and securing confidential dataGet an idea of the future of extortion tactics and how technological advances will affect their developmentIn DetailMore and more cyber threats keep emerging every day, affecting organizations across the board, targeting the entire spectrum of the Internet. Digital--or cyber--extortion so far has come across as the most serious of such threats as it seeks to profit from criminal activity, akin to blackmail. Such extortion has been rising exponentially in the digital age and has become a huge illegal money-making business, affecting users and organizations ranging from small businesses to large enterprises.This is an insightful study spelling out in detail the ways and means employed by cyber criminals in targeting various devices and the multiple dangers such malicious activity embodies.Here will be found an overview of methods employed to impact and infect computers, smartphones, servers, and the IoT for cyber extortion. Then, it will move on to specific subjects in more detail, covering attacks such as DDoS-based extortion, cryptoviruses, and ransomware. You will learn how to prevent such attacks and eliminate them if you are compromised. This book will help you become a pro at securing your data and preventing your organization from paying a hefty ransom.Style and approachThis step-by-step guide will start with the fundamentals of digital or cyber extortion and the various techniques used by hackers to demand ransom from an organization. It also focuses on types of ransomware and how it can infect your computer, mobile, cloud, server, and IOT. This practical guide will also explain how you can eliminate such attacks by leveraging various open source/commercial tools.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Thakkar, Dhanya
856 40 - ELECTRONIC LOCATION AND ACCESS
Access method Cyberlibris
Uniform Resource Identifier <a href="https://international.scholarvox.com/netsen/book/88842832">https://international.scholarvox.com/netsen/book/88842832</a>
Electronic format type text/html
Host name

Pas d'exemplaire disponible.

PLUDOC

PLUDOC est la plateforme unique et centralisée de gestion des bibliothèques physiques et numériques de Guinée administré par le CEDUST. Elle est la plus grande base de données de ressources documentaires pour les Étudiants, Enseignants chercheurs et Chercheurs de Guinée.

Adresse

627 919 101/664 919 101

25 boulevard du commerce
Kaloum, Conakry, Guinée

Réseaux sociaux

Powered by Netsen Group @ 2025