Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Use coupon code “MARCH20” for a 20% discount on all items! Valid until 31-03-2025

Site Logo
Site Logo

Royal Mail  express delivery to UK destinations

Regular sales and promotions

Stock updates every 20 minutes!

Ransomware: Penetration Testing and Contingency Planning

Out of stock

Firm sale: non returnable item
SKU 9781032556697 Categories ,
Select Guide Rating
Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author provides an overview of what Ransomware is all about, and the timeline of its evolution.

Ransomware is a threat variant that has existed for a very lon...

£29.99

Buy new:

Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

Shipping costs: All shipping costs calculated in the cart or during the checkout process.

Standard service (normally 2-3 working days): 48hr Tracked service.

Premium service (next working day): 24hr Tracked service – signature service included.

Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

Signature Service: This service is only available for tracked items.

Leave in Safe Place: This option is available at no additional charge for tracked services.

Description

Product ID:9781032556697
Product Form:Paperback / softback
Country of Manufacture:GB
Series:Cyber Shorts
Title:Ransomware
Subtitle:Penetration Testing and Contingency Planning
Authors:Author: Ravindra Das
Page Count:122
Subjects:Coding theory and cryptology, Coding theory & cryptology, Forensic science, Economics, Hospitality and service industries, Legal aspects of criminology, Digital and information technologies: Legal aspects, Internet guides and online services, Privacy and data protection, Computer fraud and hacking, Computer viruses, Trojans and worms, Spyware, Network management, Forensic science, Economics, Security services, Criminology: legal aspects, Legal aspects of IT, Internet guides & online services, Privacy & data protection, Computer fraud & hacking, Computer viruses, Trojans & worms, Spyware, Network management
Description:Select Guide Rating
Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author provides an overview of what Ransomware is all about, and the timeline of its evolution.

Ransomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, ransomware attacks have become much more covert and stealthier than when they first came out. In this book, the author provides an overview of ransomware and the timeline of its evolution.

The author also discusses famous ransomware attacks that have occurred, with a special focus on SolarWinds and critical infrastructure before taking a deep dive into penetration testing and how it can be used to mitigate the risks of a ransomware attack from happening. The author also covers incident response, disaster recovery, and business continuity planning. We even look at an appropriate data backup plan as well.


Imprint Name:CRC Press
Publisher Name:Taylor & Francis Ltd
Country of Publication:GB
Publishing Date:2023-12-21