Se ordini entro 5 ore e 25 minuti, consegna garantita in 48 ore lavorative
scegliendo le spedizioni Express
Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
This book is a comprehensive review of ransomware that covers ransomware from every angle. It presents origins, components, purpose, impacts, relevant laws, prevention techniques and proposed solutions. This book also introduces novel concepts such as the Three Cs of Ransomware and The Great Shut Down, Reboot, Pull the Plug Debate.
This indispensable book provides readers with the most comprehensive information regarding ransomware ever assembled. It distils technical, legal, and practical topics in a style that is both readable and usable.
Offering a thorough and compelling new perspective on ransomware, this invaluable resource benefits business leaders, IT professionals, security and privacy experts and legal practitioners. Students, and anyone seeking to understand this critical issue will want to purchase this book. It is a concise, contemporary, and compelling new perspective on ransomware that will help frame decisions for corporations and policymakers alike.
Abstract.- Acknowledgements.- Foreward.- Introduction.- What Ransomware Is and How It Works.- The Three Cs of Ransomware.- Business Impacts of Ransomware.- Preparation, Response, and Recovery.- Proposed Solutions.- Bibliography.
With over 15 years of dedicated IT, Security, and Privacy service, Harry is an experienced business leader known for developing and implementing robust cybersecurity and privacy strategies. His expertise is underpinned by a Master's degree in cybersecurity from Brown University and industry-leading certifications, including CISSP and CIPP/US, complemented by a continuous learning journey through professional development and industry engagement.
Harry completed the most comprehensive academic research on ransomware ever attempted. His research included:
He introduced novel concepts, such as the Three Cs of Ransomware, that helped readers visualize the various aspects of cyber-extortion attacks. That research led to the authoring of the book Digital Shakedown: The Complete Guide to Understanding and Combating Ransomware
Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.