Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

Buy

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. 

This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks.

Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text.  Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.

(HTML tags aren't allowed.)

Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity

Become an Ethereum Blockchain developer using a blend of concepts and hands-on implementations

Key Features

  • Understand the Ethereum Ecosystem and its differences from its rich cousin Bitcoin
  • Explore the Solidity programming language and smart contract optimizations
  • ...
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development

Understand the Blockchain revolution and get to grips with Ethereum, Hyperledger Fabric, and Corda.

Key Features

  • Resolve common challenges and problems faced in the Blockchain domain
  • Study architecture, concepts, terminologies, and Dapps
  • Make smart choices...

Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Hands-on Kubernetes on Azure: Use Azure Kubernetes Service to automate management, scaling, and deployment of containerized applications, 3rd Edition
Hands-on Kubernetes on Azure: Use Azure Kubernetes Service to automate management, scaling, and deployment of containerized applications, 3rd Edition

Understand the fundamentals of Kubernetes deployment on Azure with a learn-by-doing approach

Key Features

  • Get to grips with the fundamentals of containers and Kubernetes
  • Deploy containerized applications using the Kubernetes platform
  • Learn how you can...
Pointers in C Programming: A Modern Approach to Memory Management, Recursive Data Structures, Strings, and Arrays
Pointers in C Programming: A Modern Approach to Memory Management, Recursive Data Structures, Strings, and Arrays

Gain a better understanding of pointers, from the basics of how pointers function at the machine level, to using them for a variety of common and advanced scenarios. This short contemporary guide book on pointers in C programming provides a resource for professionals and advanced students needing in-depth hands-on coverage of pointer...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy