Catalog Search Results
Showing Results using Keyword index
Author
Publisher
IT Governance Publishing
Pub. Date
2022.
Language
English
Description
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
4) The art of cyberwarfare: an investigator's guide to espionage, ransomware, and organized cybercrime
Author
Publisher
No Starch Press Inc
Pub. Date
2022.
Language
English
Description
"This book is a guide to understanding the players in today's cyber wars, the techniques they use, and the process of analyzing their attacks. It provides an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations and informs how defenders can track and attribute future attacks"--
Author
Publisher
MIT Sloan Management Review
Pub. Date
[2022]
Language
English
Description
Ransomware has become a global scourge, as gangs of cybercriminals use malware to encrypt victims' data and extort payment as a condition of restoring access. The majority of business leaders who fall prey to the tactic are unprepared for the scenario and wind up paying the ransom. The authors suggest a more considered approach to that decision and walk readers through six questions that can illuminate their options and inform their choices.
Author
Publisher
MIT Sloan Management Review
Pub. Date
2023.
Language
English
Description
Most organizations put more resources toward identification, protection, and detection rather than their ability to respond to and recover from a cyber breach, leaving themselves vulnerable. But because companies can’t protect against every new cyberattack, it’s critical that they reduce the potential impact by putting more focus on cyber resilience. The authors describe how leaders can apply seven biology-inspired adaptive design principles to...
Author
Publisher
MIT Sloan Management Review
Pub. Date
2022.
Language
English
Description
Lessons and insights from past cyberattacks can help companies prepare and respond more successfully to future threats. The authors conducted in-depth interviews with senior leaders whose companies had previously endured serious cyberattacks to learn from their experiences. In this article, they describe three common mistakes people make that inhibit successful recovery from a cyberattack, as well as three elements at the heart of responding successfully...
Author
Publisher
O'Reilly Media, Inc
Pub. Date
2023
Language
English
Description
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions...
Author
Publisher
Packt Publishing Ltd
Pub. Date
2022.
Language
English
Description
With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in increasing the business's cyber resilience due to its complex nature and the lack of a clear return on investment. This book demystifies the perception that cybersecurity is a technical problem,...
Author
Publisher
Praeger, an imprint of ABC-CLIO, LLC
Pub. Date
[2016]
Language
English
Appears on list
Description
This book provides a comprehensive summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government--international, national, state, and local, explaining cybercrime in a highly networked world.
Author
Publisher
O'Reilly Media
Pub. Date
[2018]
Language
English
Description
Adversaries and hackers have gained significant and distinct advantages in cyber warfare today. Creative, fast, and opportunistic attackers have created an ecosystem of advanced persistent threats that is growing in scale and complexity, and evolving more rapidly than our capabilities to respond. By integrating machine intelligence (MI), you can significantly modernize your organization's security operations to better keep pace with these threats....
Author
Publisher
McGraw-Hill Education
Pub. Date
[2017]
Language
English
Description
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries. Written in the battle-tested Hacking Exposed style, the book arms you with the skills and tools necessary to defend against...
Author
Publisher
John Wiley & Sons, Inc
Language
English
Appears on list
Formats
Description
In "Navigating the Cybersecurity Career Path", decorated Chief Information Security Officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
Author
Publisher
Packt Publishing, Limited
Pub. Date
2022
Language
English
Description
Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and tools Key Features Understand modern human-operated cyber attacks, focusing on threat actor tactics, techniques, and procedures Collect and analyze ransomware-related cyber threat intelligence from various sources Use forensic methods and tools to...
Author
Publisher
Apress
Pub. Date
2019.
Language
English
Description
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response...
Author
Publisher
PACKT PUBLISHING LIMITED
Pub. Date
2023
Language
English
Description
Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a detailed tour of the dark web ecosystem and the tools and tactics used to mitigate cyber threats Key Features Get up to speed with the ins and outs of cybercriminal activity on the dark web Become familiar with the tools and techniques that are used to fight serious crime Gain a keen understanding of the crime ecosystem on the dark web and the best practices...
Author
Publisher
Apress
Pub. Date
[2018]
Language
English
Description
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book's ideas and put them to work. The...
Author
Publisher
O'Reilly Media
Pub. Date
2016.
Language
English
Appears on list
Formats
Description
"The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware can infect your system and what steps you can take to stop the attack before it sets foot in your network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request