Ouça e leia

Entre em um mundo infinito de histórias

  • Ler e ouvir tanto quanto você quiser
  • Com mais de 500.000 títulos
  • Títulos exclusivos + Storytel Originals
  • 7 dias de teste gratuito, depois R$19,90/mês
  • Fácil de cancelar a qualquer momento
Assine agora
br bdp devices

Ransomware Protection Playbook

2 Avaliações

3

Duração
10H 28min
Idiomas
Inglês
Format
Categoria

Não-ficção

Avoid becoming the next ransomware victim by taking practical steps today

Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day.

In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.

In addition to walking you through the necessary technical preventative measures, this critical book will show you how to:

● Quickly detect an attack, limit the damage, and decide whether to pay the ransom

● Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage

● Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business

© 2021 Ascent Audio (Audiolivros): 9781663717306

Data de lançamento

Audiolivros: 31 de dezembro de 2021

Tags

    Outros também usufruíram...

    1. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    2. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    3. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    4. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    5. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
    6. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    7. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    8. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    9. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    10. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    11. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    12. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    13. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    14. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    15. Cybercrime Investigators Handbook Graeme Edwards
    16. Schneier on Security Bruce Schneier
    17. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    18. The Art of Deception: Controlling the Human Element of Security William L. Simon
    19. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    20. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    21. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    22. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
    23. The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    24. If It's Smart, It's Vulnerable Mikko Hypponen
    25. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    26. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    27. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    28. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    29. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    30. Breached!: Why Data Security Law Fails and How to Improve It Daniel J. Solove
    31. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    32. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
    33. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    34. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    35. Cybersecurity For Dummies Joseph Steinberg
    36. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
    37. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
    38. The Future of Violence: Robots and Germs, Hackers and Drones—Confronting a New Age of Threat Benjamin Wittes
    39. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    40. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
    41. Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux | 7 books in 1 HUGO HOFFMAN
    42. Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare The Great Courses
    43. Hacking: How to Hack Alex Wagner