LEADER 04450nam 22005535 450 001 9910921016203321 005 20250806165151.0 010 $a9798868810299 024 7 $a10.1007/979-8-8688-1029-9 035 $a(CKB)37122152100041 035 $a(MiAaPQ)EBC31868078 035 $a(Au-PeEL)EBL31868078 035 $a(DE-He213)979-8-8688-1029-9 035 $a(OCoLC)1482813927 035 $a(CaSebORM)9798868810299 035 $a(OCoLC)1482736767 035 $a(OCoLC-P)1482736767 035 $a(EXLCZ)9937122152100041 100 $a20250101d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecuring an Enterprise $eMaximizing Digital Experiences through Enhanced Security Measures /$fby Anirudh Khanna 205 $a1st ed. 2024. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2024. 215 $a1 online resource (536 pages) 311 08$a9798868810282 327 $aPart I: Introduction to Cybersecurity -- Chapter 1: Introduction to Cybersecurity -- Chapter 2: Threat Landscape -- Chapter 3: Security Principles -- Chapter 4: Authentication in Cybersecurity -- Part II: Ransomware Basics and Prevention -- Chapter 5: Introduction to Ransomware -- Chapter 6: Ransomware Lifecycle -- Chapter 7: Ransomware Prevention -- Part III: Ransomware Detection and Response -- Chapter 8: Early Detection Techniques -- Chapter 9: Incident Response -- Chapter 10 -- Threat Intelligence -- Part IV: Ransomware Recovery Strategies -- Chapter 11: Backup and Restore -- Chapter 12: Ransomware Recovery Framework -- Chapter 13: Negotiating with Attackers -- Chapter 14: Rebuilding and Strengthening Security Posture -- Part V: Real-world Perspectives -- Chapter 15: Case Studies in the E-commerce Industry -- Chapter 16: Ransomware, Inc.: The Business and Economics of Digital Extortion -- Chapter 17: Case Studies in Confidential Computing -- Chapter 18: Case Studies in Cloud Computing -- Chapter 19: Case Studies in Enterprise Security Architecture -- Chapter 20: Case Studies in Energy -- Chapter 21: Securing Digital Foundations - A Point of View on Cybersecurity in Healthcare -- Part VI: Future Trends in Cybersecurity -- Chapter 22: Future Trends in Digital Security. 330 $aDive into the world of digital security and navigate its intricate landscape. In an era where digital reliance is ubiquitous, the need for robust cybersecurity measures has never been more pressing. Part of author Saurav Bhattacharya?s trilogy that covers the essential pillars of digital ecosystems?security, reliability, and usability?this book sheds light on the dynamic challenges posed by cyber threats, advocating for innovative security solutions that safeguard users while upholding their digital freedoms. Against the backdrop of rapid technological advancement and escalating cyber threats, this book addresses pressing security concerns at the forefront of our digital era. You?ll learn that trust plays a pivotal role in fostering a secure digital environment, enabling individuals and organizations to flourish without fear of malicious exploits. With transformative technologies like AI, blockchain, and quantum computing on the horizon, understanding and addressing cybersecurity fundamentals is essential for traversing the evolving digital landscape. Securing an Enterprise is your roadmap towards a future where technology aligns with humanity, fostering a more equitable, secure, and interconnected world. You will: Explore advanced methodologies and innovative approaches to bolster cybersecurity Understand the potential impacts of the advancements on security Provide strategic guidance on adapting to security changes to ensure sustainability Take a holistic approach in reviewing security . 606 $aTelecommunication 606 $aComputer networks 606 $aCommunications Engineering, Networks 606 $aComputer Networks 615 0$aTelecommunication. 615 0$aComputer networks. 615 14$aCommunications Engineering, Networks. 615 24$aComputer Networks. 676 $a621.382 700 $aBhattacharya$b Saurav$01781265 701 $aKhanna$b Anirudh$01782349 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910921016203321 996 $aSecuring an Enterprise$94308418 997 $aUNINA