Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hoboken, New Jersey
Wiley
[2022]
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781119849124/?ar |
Summary: | Presents an actionable blueprint for organizations seeking a robust defense against one of the most destructive IT threats and learning about concrete steps that can be taken now to protect organizations from ransomware attacks. |
Item Description: | Includes index |
Physical Description: | 1 online resource (xxxviii, 282 pages) illustrations (some color) |
ISBN: | 9781119849131 1119849136 9781119850014 1119850010 9781394177455 1394177453 9781119849124 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-07659775X | ||
003 | DE-627-1 | ||
005 | 20240228121437.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220209s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781119849131 |c electronic bk. |9 978-1-119-84913-1 | ||
020 | |a 1119849136 |c electronic bk. |9 1-119-84913-6 | ||
020 | |a 9781119850014 |9 978-1-119-85001-4 | ||
020 | |a 1119850010 |9 1-119-85001-0 | ||
020 | |a 9781394177455 |c electronic bk. |9 978-1-394-17745-5 | ||
020 | |a 1394177453 |c electronic bk. |9 1-394-17745-3 | ||
020 | |a 9781119849124 |9 978-1-119-84912-4 | ||
035 | |a (DE-627-1)07659775X | ||
035 | |a (DE-599)KEP07659775X | ||
035 | |a (ORHE)9781119849124 | ||
035 | |a (DE-627-1)07659775X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/8 |2 23 | |
100 | 1 | |a Grimes, Roger A. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Ransomware protection playbook |c Roger A. Grimes |
264 | 1 | |a Hoboken, New Jersey |b Wiley |c [2022] | |
300 | |a 1 online resource (xxxviii, 282 pages) |b illustrations (some color) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Presents an actionable blueprint for organizations seeking a robust defense against one of the most destructive IT threats and learning about concrete steps that can be taken now to protect organizations from ransomware attacks. | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computer crimes |x Prevention | |
650 | 0 | |a Malware (Computer software) | |
650 | 0 | |a Computer fraud | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Logiciels malveillants | |
650 | 4 | |a Fraude informatique | |
650 | 4 | |a Computer fraud | |
650 | 4 | |a Business enterprises ; Computer networks ; Security measures | |
650 | 4 | |a Computer crimes ; Prevention | |
650 | 4 | |a Computer security | |
650 | 4 | |a Malware (Computer software) | |
776 | 1 | |z 1119849128 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1119849128 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119849124/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-07659775X |
---|---|
_version_ | 1833357031971487744 |
adam_text | |
any_adam_object | |
author | Grimes, Roger A. |
author_facet | Grimes, Roger A. |
author_role | aut |
author_sort | Grimes, Roger A. |
author_variant | r a g ra rag |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)07659775X (DE-599)KEP07659775X (ORHE)9781119849124 |
dewey-full | 005.8/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/8 |
dewey-search | 005.8/8 |
dewey-sort | 15.8 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02307cam a22005892c 4500</leader><controlfield tag="001">ZDB-30-ORH-07659775X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121437.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220209s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119849131</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-84913-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119849136</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-84913-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119850014</subfield><subfield code="9">978-1-119-85001-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119850010</subfield><subfield code="9">1-119-85001-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394177455</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-394-17745-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394177453</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-394-17745-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119849124</subfield><subfield code="9">978-1-119-84912-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)07659775X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP07659775X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119849124</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)07659775X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Grimes, Roger A.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ransomware protection playbook</subfield><subfield code="c">Roger A. Grimes</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxviii, 282 pages)</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Presents an actionable blueprint for organizations seeking a robust defense against one of the most destructive IT threats and learning about concrete steps that can be taken now to protect organizations from ransomware attacks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraude informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1119849128</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1119849128</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119849124/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-07659775X |
illustrated | Illustrated |
indexdate | 2025-05-28T09:45:14Z |
institution | BVB |
isbn | 9781119849131 1119849136 9781119850014 1119850010 9781394177455 1394177453 9781119849124 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xxxviii, 282 pages) illustrations (some color) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Wiley |
record_format | marc |
spelling | Grimes, Roger A. VerfasserIn aut Ransomware protection playbook Roger A. Grimes Hoboken, New Jersey Wiley [2022] 1 online resource (xxxviii, 282 pages) illustrations (some color) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index Presents an actionable blueprint for organizations seeking a robust defense against one of the most destructive IT threats and learning about concrete steps that can be taken now to protect organizations from ransomware attacks. Business enterprises Computer networks Security measures Computer security Computer crimes Prevention Malware (Computer software) Computer fraud Sécurité informatique Logiciels malveillants Fraude informatique Business enterprises ; Computer networks ; Security measures Computer crimes ; Prevention 1119849128 Erscheint auch als Druck-Ausgabe 1119849128 |
spellingShingle | Grimes, Roger A. Ransomware protection playbook Business enterprises Computer networks Security measures Computer security Computer crimes Prevention Malware (Computer software) Computer fraud Sécurité informatique Logiciels malveillants Fraude informatique Business enterprises ; Computer networks ; Security measures Computer crimes ; Prevention |
title | Ransomware protection playbook |
title_auth | Ransomware protection playbook |
title_exact_search | Ransomware protection playbook |
title_full | Ransomware protection playbook Roger A. Grimes |
title_fullStr | Ransomware protection playbook Roger A. Grimes |
title_full_unstemmed | Ransomware protection playbook Roger A. Grimes |
title_short | Ransomware protection playbook |
title_sort | ransomware protection playbook |
topic | Business enterprises Computer networks Security measures Computer security Computer crimes Prevention Malware (Computer software) Computer fraud Sécurité informatique Logiciels malveillants Fraude informatique Business enterprises ; Computer networks ; Security measures Computer crimes ; Prevention |
topic_facet | Business enterprises Computer networks Security measures Computer security Computer crimes Prevention Malware (Computer software) Computer fraud Sécurité informatique Logiciels malveillants Fraude informatique Business enterprises ; Computer networks ; Security measures Computer crimes ; Prevention |
work_keys_str_mv | AT grimesrogera ransomwareprotectionplaybook |