0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Ransomware and Cyber Extortion - Response and Prevention (Paperback): Sherri Davidoff, Matt Durrin, Karen Sprenger Ransomware and Cyber Extortion - Response and Prevention (Paperback)
Sherri Davidoff, Matt Durrin, Karen Sprenger
R1,200 R1,059 Discovery Miles 10 590 Save R141 (12%) Ships in 12 - 17 working days

Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether you'll ever recover. You must be ready. With this book, you will be. Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place. Proven checklists help your security teams act swiftly and effectively together, throughout the entire lifecycle--whatever the attack and whatever the source. Understand different forms of cyber extortion and how they evolved Quickly recognize indicators of compromise Minimize losses with faster triage and containment Identify threats, scope attacks, and locate "patient zero" Initiate and manage a ransom negotiation--and avoid costly mistakes Decide whether to pay, how to perform due diligence, and understand risks Know how to pay a ransom demand while avoiding common pitfalls Reduce risks of data loss and reinfection Build a stronger, holistic cybersecurity program that reduces your risk of getting hacked This guide offers immediate value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, executives, legislators, regulators, law enforcement professionals, and others. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Network Forensics - Tracking Hackers through Cyberspace (Hardcover): Sherri Davidoff, Jonathan Ham Network Forensics - Tracking Hackers through Cyberspace (Hardcover)
Sherri Davidoff, Jonathan Ham
R2,039 R1,918 Discovery Miles 19 180 Save R121 (6%) Ships in 10 - 15 working days

""This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.""- Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. ""It's like a symphony meeting an encyclopedia meeting a spy novel.""-Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in "Network Forensics: Tracking Hackers through Cyberspace."Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up "Network Forensics"and find out.

Data Breaches - Crisis and Opportunity (Paperback): Sherri Davidoff Data Breaches - Crisis and Opportunity (Paperback)
Sherri Davidoff
R1,050 Discovery Miles 10 500 Ships in 9 - 15 working days

"Data breaches are inevitable. It is said that there are two types of companies: those that have had a data breach and those that don’t yet know they have had one. In preparing for that inevitability, Data Breaches: Crisis and Opportunity is an invaluable guide to the history of some of the most significant data breaches, to what you can do to ensure your firm does not become another statistic and, in the event it does happen, to minimize the damage of that breach." -- Ben Rothke, RSA Book of the Month Selection Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical guidance for reducing risk and mitigating consequences. Reflecting extensive personal experience and lessons from the world’s most damaging breaches, Davidoff identifies proven tactics for reducing damage caused by breaches and avoiding common mistakes that cause them to spiral out of control. You’ll learn how to manage data breaches as the true crises they are; minimize reputational damage and legal exposure; address unique challenges associated with health and payment card data; respond to hacktivism, ransomware, and cyber extortion; and prepare for the emerging battlefront of cloud-based breaches. Understand what you need to know about data breaches, the dark web, and markets for stolen data Limit damage by going beyond conventional incident response Navigate high-risk payment card breaches in the context of PCI DSS Assess and mitigate data breach risks associated with vendors and third-party suppliers Manage compliance requirements associated with healthcare and HIPAA Quickly respond to ransomware and data exposure cases Make better decisions about cyber insurance and maximize the value of your policy Reduce cloud risks and properly prepare for cloud-based data breaches    Data Breaches is indispensable for everyone involved in breach avoidance or response: executives, managers, IT staff, consultants, investigators, students, and more. Read it before a breach happens! Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Docking Edition Multi-Functional…
R1,099 R799 Discovery Miles 7 990
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Hani - A Life Too Short
Janet Smith, Beauregard Tromp Paperback R310 R248 Discovery Miles 2 480
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Sound Of Freedom
Jim Caviezel, Mira Sorvino, … DVD R325 R218 Discovery Miles 2 180
Snookums Baby Honey Dummies (6 Months)
R70 R59 Discovery Miles 590
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Lucky Plastic 3-in-1 Nose Ear Trimmer…
R289 Discovery Miles 2 890
Shield Leather Cream (500ml)
R73 Discovery Miles 730
Wonder Organic Compost Activator (Single…
R59 R52 Discovery Miles 520

 

Partners