Catalog Search Results
Author
Pub. Date
2023
Language
Deutsch
Description
»Ransomware und Cyber-Erpressung« ist der ultimative praktische Leitfaden, um eine Ransomware-Erpressung, ein Denial-of-Service und andere Formen der Cyber-Erpressung zu überleben.Anhand ihrer eigenen, bisher unveröffentlichten Fallbibliothek zeigen die Cybersicherheitsexperten Sherri Davidoff, Matt Durrin und Karen E. Sprenger Ihnen, wie Sie schneller reagieren, den Schaden minimieren, effizienter ermitteln, die Wiederherstellung beschleunigen...
Author
Pub. Date
2022.
Language
English
Description
Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether youll ever recover. You must be ready. With this book, you will be. Ransomware and Cyber Extortion is the ultimate practical...
3) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Language
English
Formats
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"-- Provided by publisher.
Pub. Date
2022.
Language
English
Description
Welcome to Audio Learning from Assemble You. Malware is a portmanteau, a combination of the words - "malicious" and "software." It's malicious software that is designed to cause harm to a system. It could be simply deleting data or, even more perniciously, hiding like a spy in the system, monitoring our activities. It can capture your keystrokes and send them to the person, the hacker, who planted the malware in our system. This means that if we are...
Author
Pub. Date
2023
Language
English
Description
Unlock the secrets of malware data science with cutting-edge techniques, AI-driven analysis, and international compliance standards to stay ahead of the ever-evolving cyber threat landscape Key Features Get introduced to three primary AI tactics used in malware and detection Leverage data science tools to combat critical cyber threats Understand regulatory requirements for using AI in cyber threat management Purchase of the print or Kindle book includes...
Pub. Date
©2011
Language
English
Description
"A computer forensics "how-to" for fighting malicious code and analyzing incidents -- With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes...
Author
Pub. Date
2018.
Language
English
Description
"In this video course, we cover advanced malware analysis topics. Towards this goal, we first understand the behavior of different classes of malware. Such knowledge helps us to easily categorize malware based on its characteristic. We see how sophisticated malware can use techniques to either evade detection or increase its damage and access to the system. Then we learn advanced techniques in static and dynamic malware analysis and cover the details...
Author
Pub. Date
2018.
Language
English
Description
"Nearly every incident response that occurs in the cyber security field comes back to the initial intrusion vector: malware. In this course, you will learn about the various types and categories of malware, their symptoms, and how they work. As an incident responder, it is imperative that you understand the symptoms of malware, but more importantly that you are able to understand what that malware is doing, and quickly. So, if you have ever wondered...
Author
Pub. Date
[2015]
Language
English
Description
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware. After explaining malware architecture and how it operates,...
Author
Pub. Date
2021.
Language
English
Description
Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malware Key Features Book DescriptionMalicious software poses a threat to every enterprise globally. Its growth is costing businesses millions of dollars due to currency theft as a result of ransomware and lost productivity. With this book, you'll learn how to quickly triage, identify, attribute, and remediate...
Author
Pub. Date
2020
Language
English
Description
It is challenging for an organization to estimate the effectiveness of a cybersecurity strategy. Cybersecurity Threats, Malware Trends, and Strategies acts as a comprehensive guide to cybersecurity based on thousands of cybersecurity discussions and threat intelligence briefings that the author has participated in over a two-decade career.
Author
Pub. Date
2019.
Language
English
Description
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response...
Author
Series
Pub. Date
2023.
Language
English
Description
Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals...
Author
Pub. Date
[2022]
Language
English
Description
Ransomware has become a global scourge, as gangs of cybercriminals use malware to encrypt victims' data and extort payment as a condition of restoring access. The majority of business leaders who fall prey to the tactic are unprepared for the scenario and wind up paying the ransom. The authors suggest a more considered approach to that decision and walk readers through six questions that can illuminate their options and inform their choices.
Author
Pub. Date
2016.
Language
English
Description
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware d.
Author
Pub. Date
2023
Language
English
Description
Learn Windows system design from the PE binary structure to modern and practical attack techniques used by red teams to implement advanced prevention Purchase of the print or Kindle book includes a free PDF eBook Key Features Understand how malware evades modern security products Learn to reverse engineer standard PE format program files Become familiar with modern attack techniques used by multiple red teams Book Description An Advanced Persistent...
Author
Language
English
Formats
Description
Avoid becoming the next ransomware victim by taking practical steps today
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day.
In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious...
Author
Pub. Date
2010
Language
Deutsch
Description
Hauptbeschreibung Software-Schwachstellen, Bugs, Exploits - es wird viel darüber geredet, aber kaum jemand weiß, wie man Software verlässlich auf problematische Stellen hin untersucht. Sicherheitsberater Tobias Klein kennt sich aus! Wenn Sie für die Sicherheit von Softwareprodukten zuständig sind oder selbst Software entwickeln, dann sollten Sie seine Projekttagebücher lesen. Sie beschreiben reale Fälle, in denen er professionelle Software...
Author
Pub. Date
[2022]
Language
English
Description
"The Art of Mac Malware is a comprehensive guide to the threats facing Apple computers and the foundational knowledge needed to become a proficient Mac malware analyst. Using real-world examples, the book surveys the malware's various infection methods and teaches static and dynamic analysis tools needed to examine malware you may find in the wild"--
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request