買這商品的人也買了...
-
$1,970$1,872 -
$580$458 -
$880$695 -
$1,068$1,015 -
$650$507 -
$780$616 -
$352Android 安全技術揭秘與防範
-
$1,320Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems (Paperback)
-
$474$450 -
$403黑客秘笈 : 滲透測試實用指南, 2/e (The Hacker Playbook 2: Practical Guide To Penetration Testing)
-
$1,834$1,737 -
$480$379 -
$454黑客大曝光:工業控制系統安全 (Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions)
-
$580$458 -
$1,200$948 -
$480$408 -
$1,960CISSP All-in-One Exam Guide, 8/e (Paperback)
-
$520$390 -
$2,010$1,910 -
$505Swift 4 從零到精通 iOS 開發
-
$1,000$790 -
$265透視 APT — 賽博空間的高級威脅
-
$580$435 -
$480$379
相關主題
商品描述
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.
Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they’re delivered to targets. You’ll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place.
- Learn how ransomware enters your system and encrypts your files
- Understand why ransomware use has grown, especially in recent years
- Examine the organizations behind ransomware and the victims they target
- Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns
- Understand how ransom is paid—and the pros and cons of paying
- Use methods to protect your organization’s workstations and servers
商品描述(中文翻譯)
當今對企業和消費者最大的網絡威脅是勒索軟體,這是一種可以加密您的電腦文件,直到您支付贖金才能解鎖的惡意軟體。這本實用書將教您如何防止勒索軟體入侵您的系統,以及在攻擊開始之前採取的措施。
安全專家Allan Liska和Timothy Gallo解釋了這些攻擊的成功不僅產生了幾個勒索軟體的變體,還有一系列不斷變化的傳遞方式。您將學習到應對勒索軟體攻擊的實用方法,以及如何在首次感染之前保護自己。
本書內容包括:
- 了解勒索軟體如何進入您的系統並加密您的文件
- 瞭解為什麼勒索軟體的使用在近年來不斷增長
- 探討背後的組織以及他們的目標受害者
- 瞭解想要成為黑客的人如何使用勒索軟體作為服務(RaaS)來發起攻擊
- 瞭解如何支付贖金以及支付的利弊
- 使用方法來保護您的組織的工作站和伺服器