LEADER 02880nam 22005535 450 001 9910879588803321 005 20250808083413.0 010 $a3-031-65438-2 024 7 $a10.1007/978-3-031-65438-1 035 $a(MiAaPQ)EBC31596739 035 $a(Au-PeEL)EBL31596739 035 $a(CKB)33830699500041 035 $a(DE-He213)978-3-031-65438-1 035 $a(EXLCZ)9933830699500041 100 $a20240810d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Shakedown $eThe Complete Guide to Understanding and Combating Ransomware /$fby Harry Halikias 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (126 pages) 311 08$a3-031-65437-4 320 $aIncludes bibliographical references. 327 $aAbstract -- Acknowledgements -- Foreward -- Introduction -- What Ransomware Is and How It Works -- The Three Cs of Ransomware -- Business Impacts of Ransomware -- Preparation, Response, and Recovery -- Proposed Solutions -- Bibliography. 330 $aThis book is a comprehensive review of ransomware that covers ransomware from every angle. It presents origins, components, purpose, impacts, relevant laws, prevention techniques and proposed solutions. This book also introduces novel concepts such as the Three Cs of Ransomware and The Great Shut Down, Reboot, Pull the Plug Debate. This indispensable book provides readers with the most comprehensive information regarding ransomware ever assembled. It distils technical, legal, and practical topics in a style that is both readable and usable. Offering a thorough and compelling new perspective on ransomware, this invaluable resource benefits business leaders, IT professionals, security and privacy experts and legal practitioners. Students, and anyone seeking to understand this critical issue will want to purchase this book. It is a concise, contemporary, and compelling new perspective on ransomware that will help frame decisions for corporations and policymakers alike. 606 $aData protection$xLaw and legislation 606 $aComputer crimes 606 $aComputer networks$xSecurity measures 606 $aPrivacy 606 $aComputer Crime 606 $aMobile and Network Security 615 0$aData protection$xLaw and legislation. 615 0$aComputer crimes. 615 0$aComputer networks$xSecurity measures. 615 14$aPrivacy. 615 24$aComputer Crime. 615 24$aMobile and Network Security. 676 $a005.8 700 $aHalikias$b Harry$01765200 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910879588803321 996 $aDigital Shakedown$94206636 997 $aUNINA