Ransomware protection playbook:
Presents an actionable blueprint for organizations seeking a robust defense against one of the most destructive IT threats and learning about concrete steps that can be taken now to protect organizations from ransomware attacks.
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
[2022]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119849124/?ar |
Zusammenfassung: | Presents an actionable blueprint for organizations seeking a robust defense against one of the most destructive IT threats and learning about concrete steps that can be taken now to protect organizations from ransomware attacks. |
Beschreibung: | Includes index |
Umfang: | 1 Online-Ressource (xxxviii, 282 Seiten) illustrations (some color) |
ISBN: | 9781119849131 1119849136 9781119850014 1119850010 9781394177455 1394177453 9781119849124 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-07659775X | ||
003 | DE-627-1 | ||
005 | 20240228121437.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220209s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781119849131 |c electronic bk. |9 978-1-119-84913-1 | ||
020 | |a 1119849136 |c electronic bk. |9 1-119-84913-6 | ||
020 | |a 9781119850014 |9 978-1-119-85001-4 | ||
020 | |a 1119850010 |9 1-119-85001-0 | ||
020 | |a 9781394177455 |c electronic bk. |9 978-1-394-17745-5 | ||
020 | |a 1394177453 |c electronic bk. |9 1-394-17745-3 | ||
020 | |a 9781119849124 |9 978-1-119-84912-4 | ||
035 | |a (DE-627-1)07659775X | ||
035 | |a (DE-599)KEP07659775X | ||
035 | |a (ORHE)9781119849124 | ||
035 | |a (DE-627-1)07659775X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/8 |2 23 | |
100 | 1 | |a Grimes, Roger A. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Ransomware protection playbook |c Roger A. Grimes |
264 | 1 | |a Hoboken, New Jersey |b Wiley |c [2022] | |
300 | |a 1 Online-Ressource (xxxviii, 282 Seiten) |b illustrations (some color) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Presents an actionable blueprint for organizations seeking a robust defense against one of the most destructive IT threats and learning about concrete steps that can be taken now to protect organizations from ransomware attacks. | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computer crimes |x Prevention | |
650 | 0 | |a Malware (Computer software) | |
650 | 0 | |a Computer fraud | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Logiciels malveillants | |
650 | 4 | |a Fraude informatique | |
650 | 4 | |a Computer fraud | |
650 | 4 | |a Business enterprises ; Computer networks ; Security measures | |
650 | 4 | |a Computer crimes ; Prevention | |
650 | 4 | |a Computer security | |
650 | 4 | |a Malware (Computer software) | |
776 | 1 | |z 1119849128 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1119849128 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119849124/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-07659775X |
---|---|
_version_ | 1821494824785674240 |
adam_text | |
any_adam_object | |
author | Grimes, Roger A. |
author_facet | Grimes, Roger A. |
author_role | aut |
author_sort | Grimes, Roger A. |
author_variant | r a g ra rag |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)07659775X (DE-599)KEP07659775X (ORHE)9781119849124 |
dewey-full | 005.8/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/8 |
dewey-search | 005.8/8 |
dewey-sort | 15.8 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02309cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-07659775X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121437.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220209s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119849131</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-84913-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119849136</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-84913-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119850014</subfield><subfield code="9">978-1-119-85001-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119850010</subfield><subfield code="9">1-119-85001-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394177455</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-394-17745-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394177453</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-394-17745-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119849124</subfield><subfield code="9">978-1-119-84912-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)07659775X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP07659775X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119849124</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)07659775X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Grimes, Roger A.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ransomware protection playbook</subfield><subfield code="c">Roger A. Grimes</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxviii, 282 Seiten)</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Presents an actionable blueprint for organizations seeking a robust defense against one of the most destructive IT threats and learning about concrete steps that can be taken now to protect organizations from ransomware attacks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraude informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1119849128</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1119849128</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119849124/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-07659775X |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:31Z |
institution | BVB |
isbn | 9781119849131 1119849136 9781119850014 1119850010 9781394177455 1394177453 9781119849124 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxxviii, 282 Seiten) illustrations (some color) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Wiley |
record_format | marc |
spelling | Grimes, Roger A. VerfasserIn aut Ransomware protection playbook Roger A. Grimes Hoboken, New Jersey Wiley [2022] 1 Online-Ressource (xxxviii, 282 Seiten) illustrations (some color) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index Presents an actionable blueprint for organizations seeking a robust defense against one of the most destructive IT threats and learning about concrete steps that can be taken now to protect organizations from ransomware attacks. Business enterprises Computer networks Security measures Computer security Computer crimes Prevention Malware (Computer software) Computer fraud Sécurité informatique Logiciels malveillants Fraude informatique Business enterprises ; Computer networks ; Security measures Computer crimes ; Prevention 1119849128 Erscheint auch als Druck-Ausgabe 1119849128 |
spellingShingle | Grimes, Roger A. Ransomware protection playbook Business enterprises Computer networks Security measures Computer security Computer crimes Prevention Malware (Computer software) Computer fraud Sécurité informatique Logiciels malveillants Fraude informatique Business enterprises ; Computer networks ; Security measures Computer crimes ; Prevention |
title | Ransomware protection playbook |
title_auth | Ransomware protection playbook |
title_exact_search | Ransomware protection playbook |
title_full | Ransomware protection playbook Roger A. Grimes |
title_fullStr | Ransomware protection playbook Roger A. Grimes |
title_full_unstemmed | Ransomware protection playbook Roger A. Grimes |
title_short | Ransomware protection playbook |
title_sort | ransomware protection playbook |
topic | Business enterprises Computer networks Security measures Computer security Computer crimes Prevention Malware (Computer software) Computer fraud Sécurité informatique Logiciels malveillants Fraude informatique Business enterprises ; Computer networks ; Security measures Computer crimes ; Prevention |
topic_facet | Business enterprises Computer networks Security measures Computer security Computer crimes Prevention Malware (Computer software) Computer fraud Sécurité informatique Logiciels malveillants Fraude informatique Business enterprises ; Computer networks ; Security measures Computer crimes ; Prevention |
work_keys_str_mv | AT grimesrogera ransomwareprotectionplaybook |