000 03121nam a22005415i 4500
001 978-3-031-65438-1
003 DE-He213
005 20250516160119.0
007 cr nn 008mamaa
008 240810s2024 sz | s |||| 0|eng d
020 _a9783031654381
_9978-3-031-65438-1
050 4 _aQA76.9.A25
050 4 _aJC596-596.2
072 7 _aURD
_2bicssc
072 7 _aCOM060040
_2bisacsh
072 7 _aURD
_2thema
082 0 4 _a005.8
_223
082 0 4 _a323.448
_223
100 1 _aHalikias, Harry.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aDigital Shakedown
_h[electronic resource] :
_bThe Complete Guide to Understanding and Combating Ransomware /
_cby Harry Halikias.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXV, 117 p. 37 illus., 31 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aAbstract -- Acknowledgements -- Foreward -- Introduction -- What Ransomware Is and How It Works -- The Three Cs of Ransomware -- Business Impacts of Ransomware -- Preparation, Response, and Recovery -- Proposed Solutions -- Bibliography.
520 _aThis book is a comprehensive review of ransomware that covers ransomware from every angle. It presents origins, components, purpose, impacts, relevant laws, prevention techniques and proposed solutions. This book also introduces novel concepts such as the Three Cs of Ransomware and The Great Shut Down, Reboot, Pull the Plug Debate. This indispensable book provides readers with the most comprehensive information regarding ransomware ever assembled. It distils technical, legal, and practical topics in a style that is both readable and usable. Offering a thorough and compelling new perspective on ransomware, this invaluable resource benefits business leaders, IT professionals, security and privacy experts and legal practitioners. Students, and anyone seeking to understand this critical issue will want to purchase this book. It is a concise, contemporary, and compelling new perspective on ransomware that will help frame decisions for corporations and policymakers alike.
541 _fUABC ;
_cPerpetuidad
650 0 _aData protection
_xLaw and legislation.
650 0 _aComputer crimes.
650 0 _aComputer networks
_xSecurity measures.
650 1 4 _aPrivacy.
650 2 4 _aComputer Crime.
650 2 4 _aMobile and Network Security.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031654374
776 0 8 _iPrinted edition:
_z9783031654398
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-65438-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cLIBRO_ELEC
999 _c275992
_d275991