ISBN-13: 9781548276607 / Angielski / Miękka / 2017 / 170 str.
Ransomware - Malware - WannaCry These pages are not just ransomware definitions or descriptions. Not just case studies of others' demises. Not just warnings and admonitions of what not to do. They are pages to give understanding and the justification for taking the action steps given so that you can prevent most any ransomware attack and, if not, recover from the attack fast and inexpensively without paying a ransom. WannaCry News - Ransomware Windows 7 Author David Pettit invites us to understand the progression and varieties of ransomware. To be informed of the things we may do to prevent and minimize an attack. To know that we are prepared. To go forth into the computing and Internet world without fear. To have confidence that we can recover with ease and thumb our noses at the criminals who would hold us up. Windows Ransomware - WannaCry Microsoft Patch Microsoft, Apple, and Linux systems are all under attack. Many technology pundits have been down on Microsoft as THE vulnerable platform with the implication that Apple and Linux platforms are not vulnerable. Ransomware criminals are not as picky as other malware creators may have been in the past. They are equal opportunity thieves. The material is useful for both the non-technical computer user and for information technology professionals. Users will find normal and easily understood words. Professional information technology workers will find an up to date list of ransomware, see that is has evolved over time, learn what can be done about it, have all the source references of the research presented, and be able to support users and clients better. Everyone will benefit from the focus on business continuity. At the end is helpful sample content for many company standards, policies, procedures, checklists, forms, and guidelines. Some of the most well-known ransomware: Spora, Cerber, Osiris, Goldeneye Petya, Wallet Dharma, TeslaCrypt, CryptXXX, CryptoWall, Locky, Ranscam, WannaCry