000 | 03121nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-031-65438-1 | ||
003 | DE-He213 | ||
005 | 20250516160119.0 | ||
007 | cr nn 008mamaa | ||
008 | 240810s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031654381 _9978-3-031-65438-1 |
||
050 | 4 | _aQA76.9.A25 | |
050 | 4 | _aJC596-596.2 | |
072 | 7 |
_aURD _2bicssc |
|
072 | 7 |
_aCOM060040 _2bisacsh |
|
072 | 7 |
_aURD _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
082 | 0 | 4 |
_a323.448 _223 |
100 | 1 |
_aHalikias, Harry. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aDigital Shakedown _h[electronic resource] : _bThe Complete Guide to Understanding and Combating Ransomware / _cby Harry Halikias. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXV, 117 p. 37 illus., 31 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aAbstract -- Acknowledgements -- Foreward -- Introduction -- What Ransomware Is and How It Works -- The Three Cs of Ransomware -- Business Impacts of Ransomware -- Preparation, Response, and Recovery -- Proposed Solutions -- Bibliography. | |
520 | _aThis book is a comprehensive review of ransomware that covers ransomware from every angle. It presents origins, components, purpose, impacts, relevant laws, prevention techniques and proposed solutions. This book also introduces novel concepts such as the Three Cs of Ransomware and The Great Shut Down, Reboot, Pull the Plug Debate. This indispensable book provides readers with the most comprehensive information regarding ransomware ever assembled. It distils technical, legal, and practical topics in a style that is both readable and usable. Offering a thorough and compelling new perspective on ransomware, this invaluable resource benefits business leaders, IT professionals, security and privacy experts and legal practitioners. Students, and anyone seeking to understand this critical issue will want to purchase this book. It is a concise, contemporary, and compelling new perspective on ransomware that will help frame decisions for corporations and policymakers alike. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 |
_aData protection _xLaw and legislation. |
|
650 | 0 | _aComputer crimes. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aPrivacy. |
650 | 2 | 4 | _aComputer Crime. |
650 | 2 | 4 | _aMobile and Network Security. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031654374 |
776 | 0 | 8 |
_iPrinted edition: _z9783031654398 |
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-65438-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cLIBRO_ELEC | ||
999 |
_c275992 _d275991 |