Muutke küpsiste eelistusi

E-raamat: Ransomware: Penetration Testing and Contingency Planning

(President, HTG Solutions, IL, USA)
  • Formaat: 132 pages
  • Sari: Cyber Shorts
  • Ilmumisaeg: 21-Dec-2023
  • Kirjastus: CRC Press
  • Keel: eng
  • ISBN-13: 9781003824541
  • Formaat - EPUB+DRM
  • Hind: 38,99 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 132 pages
  • Sari: Cyber Shorts
  • Ilmumisaeg: 21-Dec-2023
  • Kirjastus: CRC Press
  • Keel: eng
  • ISBN-13: 9781003824541

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author provides an overview of what Ransomware is all about, and the timeline of its evolution.



Ransomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author provides an overview of what Ransomware is all about, and the timeline of its evolution.

The author also discusses famous Ransomware attacks that have occurred, with a special focus on Solar Winds and Critical Infrastructure before taking a deep dive into Penetration Testing, and how it can be used to mitigate the risks of a Ransomware attack from happening. The author also covers Incident Response, Disaster Recovery, and Business Continuity Planning. We even look at an appropriate Data Backup Plan as well.

1. Introduction.
2. A Technical Review of Ransomware Attacks.
3. The Importance of Penetration Testing.
4. How to Recover from a Ransomware Attack.
5. Conclusion

Ravindra Das is a technical writer in the cybersecurity realm. He does cybersecurity consulting on the side through his private practice, RaviDas.Tech, Inc. He also holds the Certified in Cybersecurity certification from the ISC2.