Dive into the world of digital security and navigate its intricate landscape. In an era where digital reliance is ubiquitous, the need for robust cybersecurity measures has never been more pressing. Part of author Saurav Bhattacharya's trilogy that covers the essential pillars of digital ecosystems-security, reliability, and usability-this book sheds light on the dynamic challenges posed by cyber threats, advocating for innovative security solutions that safeguard users while upholding their digital freedoms. Against the backdrop of rapid technological advancement and escalating cyber…mehr
Dive into the world of digital security and navigate its intricate landscape. In an era where digital reliance is ubiquitous, the need for robust cybersecurity measures has never been more pressing. Part of author Saurav Bhattacharya's trilogy that covers the essential pillars of digital ecosystems-security, reliability, and usability-this book sheds light on the dynamic challenges posed by cyber threats, advocating for innovative security solutions that safeguard users while upholding their digital freedoms.
Against the backdrop of rapid technological advancement and escalating cyber threats, this book addresses pressing security concerns at the forefront of our digital era. You'll learn that trust plays a pivotal role in fostering a secure digital environment, enabling individuals and organizations to flourish without fear of malicious exploits. With transformative technologies like AI, blockchain, and quantum computing on the horizon, understanding and addressing cybersecurity fundamentals is essential for traversing the evolving digital landscape.
Securing an Enterprise is your roadmap towards a future where technology aligns with humanity, fostering a more equitable, secure, and interconnected world.
What You will Learn Explore advanced methodologies and innovative approaches to bolster cybersecurityUnderstand the potential impacts of the advancements on securityProvide strategic guidance on adapting to security changes to ensure sustainabilityTake a holistic approach in reviewing security Who This Book Is For
Cybersecurity Professionals, Technology Developers and Engineers Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Anirudh Khanna is a distinguished technical and thought leader in the fields of backup and recovery, disaster recovery, and ransomware attack recovery. With over 16 years of experience, Anirudh has successfully led initiatives to safeguard data and ensure business continuity for several Fortune 500 companies. Anirudh is widely recognized for his expertise in ransomware protection and recovery. Notably, he led the implementation of a ransomware recovery solution for one of the largest gas and electricity companies in the United States, ensuring compliance with the TSA directive. His efforts significantly improved the company's resilience against cyberattacks, reduced recovery times, and strengthened its overall cybersecurity posture. In addition to his technical achievements, Anirudh serves as the Senior Vice President of the New World Foundation, where he led the development of a patented solution for conducting cybersecurity assessments tailored to small businesses. This groundbreaking innovation integrates modules for cyberattack prevention, recovery, privacy reviews, risk assessment, and security audits, addressing the unique challenges faced by smaller enterprises in today's threat landscape. As a prolific author, Anirudh has published over 20 research papers in reputed journals and presented at more than seven international conferences. His contributions to the advancement of ransomware defense mechanisms have garnered numerous prestigious awards, including the Stevie, Globee, and Titan Awards for technological excellence. For the past seven years, Anirudh has played a pivotal role in providing business continuity services for critical infrastructure at one of the largest utility companies in the United States. He is also a Senior Member of IEEE, regularly reviews research papers for highly reputed journals and conferences and is a sought-after expert in data protection and cyber recovery. Anirudh's extensive body of work, including articles and research papers, highlights his capabilities as a visionary in data protection and cyber recovery, cementing his status as a respected authority in the industry.
Inhaltsangabe
Part I: Introduction to Cybersecurity.- Chapter 1: Introduction to Cybersecurity.- Chapter 2: Threat Landscape.- Chapter 3: Security Principles.- Chapter 4: Authentication in Cybersecurity.- Part II: Ransomware Basics and Prevention.- Chapter 5: Introduction to Ransomware.- Chapter 6: Ransomware Lifecycle.- Chapter 7: Ransomware Prevention.- Part III: Ransomware Detection and Response.- Chapter 8: Early Detection Techniques.- Chapter 9: Incident Response.- Chapter 10.- Threat Intelligence.- Part IV: Ransomware Recovery Strategies.- Chapter 11: Backup and Restore.- Chapter 12: Ransomware Recovery Framework.- Chapter 13: Negotiating with Attackers.- Chapter 14: Rebuilding and Strengthening Security Posture.- Part V: Real-world Perspectives.- Chapter 15: Case Studies in the E-commerce Industry.- Chapter 16: Ransomware, Inc.: The Business and Economics of Digital Extortion.- Chapter 17: Case Studies in Confidential Computing.- Chapter 18: Case Studies in Cloud Computing.- Chapter 19: Case Studies in Enterprise Security Architecture.- Chapter 20: Case Studies in Energy.- Chapter 21: Securing Digital Foundations - A Point of View on Cybersecurity in Healthcare.- Part VI: Future Trends in Cybersecurity.- Chapter 22: Future Trends in Digital Security.
Part I: Introduction to Cybersecurity.- Chapter 1: Introduction to Cybersecurity.- Chapter 2: Threat Landscape.- Chapter 3: Security Principles.- Chapter 4: Authentication in Cybersecurity.- Part II: Ransomware Basics and Prevention.- Chapter 5: Introduction to Ransomware.- Chapter 6: Ransomware Lifecycle.- Chapter 7: Ransomware Prevention.- Part III: Ransomware Detection and Response.- Chapter 8: Early Detection Techniques.- Chapter 9: Incident Response.- Chapter 10.- Threat Intelligence.- Part IV: Ransomware Recovery Strategies.- Chapter 11: Backup and Restore.- Chapter 12: Ransomware Recovery Framework.- Chapter 13: Negotiating with Attackers.- Chapter 14: Rebuilding and Strengthening Security Posture.- Part V: Real-world Perspectives.- Chapter 15: Case Studies in the E-commerce Industry.- Chapter 16: Ransomware, Inc.: The Business and Economics of Digital Extortion.- Chapter 17: Case Studies in Confidential Computing.- Chapter 18: Case Studies in Cloud Computing.- Chapter 19: Case Studies in Enterprise Security Architecture.- Chapter 20: Case Studies in Energy.- Chapter 21: Securing Digital Foundations - A Point of View on Cybersecurity in Healthcare.- Part VI: Future Trends in Cybersecurity.- Chapter 22: Future Trends in Digital Security.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826