Inicio > > Estilos de vida digital > Guías de Internet y servicios en línea > Windows Ransomware Detection and Protection
Windows Ransomware Detection and Protection

Windows Ransomware Detection and Protection

Marius Sandbu

55,52 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2023
Materia
Guías de Internet y servicios en línea
ISBN:
9781803246345
55,52 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Desdémona
  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threatsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Learn to build security monitoring solutions based on Microsoft 365 and SentinelUnderstand how Zero-Trust access and SASE services can help in mitigating risksBuild a secure foundation for Windows endpoints, email, infrastructure, and cloud servicesBook Description:If you’re looking for an effective way to secure your environment against ransomware attacks, this is the book for you. From teaching you how to monitor security threats to establishing countermeasures to protect against ransomware attacks, Windows Ransomware Detection and Protection has it all covered.The book begins by helping you understand how ransomware attacks work, identifying different attack vectors, and showing you how to build a secure network foundation and Windows environment. You’ll then explore ransomware countermeasures in different segments, such as Identity and Access Management, networking, Endpoint Manager, cloud, and infrastructure, and learn how to protect against attacks. As you move forward, you’ll get to grips with the forensics involved in making important considerations when your system is attacked or compromised with ransomware, the steps you should follow, and how you can monitor the threat landscape for future threats by exploring different online data sources and building processes.By the end of this ransomware book, you’ll have learned how configuration settings and scripts can be used to protect Windows from ransomware attacks with 50 tips on security settings to secure your Windows workload.What You Will Learn:Understand how ransomware has evolved into a larger threatSecure identity-based access using services like multifactor authenticationEnrich data with threat intelligence and other external data sourcesProtect devices with Microsoft Defender and Network ProtectionFind out how to secure users in Active Directory and Azure Active DirectorySecure your Windows endpoints using Endpoint ManagerDesign network architecture in Azure to reduce the risk of lateral movementWho this book is for:This book is for Windows administrators, cloud administrators, CISOs, and blue team members looking to understand the ransomware problem, how attackers execute intrusions, and how you can use the techniques to counteract attacks. Security administrators who want more insights into how they can secure their environment will also find this book useful. Basic Windows and cloud experience is needed to understand the concepts in this book.

Artículos relacionados

  • Defending APIs
    Colin Domoney
    Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIsKey FeaturesDevelop a profound understanding of the inner workings of APIs with a sharp focus on securityLearn the tools and techniques employed by API security testers and hackers, establishing your own hacking laboratoryMaster the art of building robust AP...
    Disponible

    63,10 €

  • Cloud Forensics Demystified
    Ganesh Ramakrishnan / Mansoor Haqanee
    Enhance your skills as a cloud investigator to adeptly respond to cloud incidents by combining traditional forensic techniques with innovative approachesKey FeaturesUncover the steps involved in cloud forensic investigations for M365 and Google WorkspaceExplore tools and logs available within AWS, Azure, and Google for cloud investigationsLearn how to investigate containerized ...
    Disponible

    63,10 €

  • BizTalk 2013 EDI for Supply Chain Management
    Mark Beckner
    Building a successful supply chain processing EDI implementation in BizTalk Server can be complex. Decisions must be made around how to extract and publish data, how to map to the various EDI standards, and how to appropriately batch and deliver data. If architected properly, your BizTalk solution can be highly efficient, simple, and something that can be managed and extended f...
    Disponible

    67,04 €

  • Interview Questions in Business Analytics
    Bhasker Gupta
    Discover relevant questions-and detailed answers-to help you prepare for job interviews and break into the field of analytics. This book contains more than 200 questions based on consultations with hiring managers and technical professionals already working in analytics. Interview Questions in Business Analytics: How to Ace Interviews and Get the Job You Want fills a gap in inf...
    Disponible

    48,65 €

  • Managing Your Outsourced IT Services Provider
    Venkatesh Upadrista
    Managing Your Outsourced IT Services Provider teaches executives and managers of organizations how to unleash the full potential of their outsourced IT services workforce and IT-enabled business processes safely and profitably. Drawing on two decades of experience managing client relationships for global IT services companies, Venkatesh Upadrista guides outsourcing organization...
    Disponible

    42,44 €

  • Mining Lurkers in Online Social Networks
    Andrea Tagarelli / Roberto Interdonato
    This SpringerBrief  brings order  to the wealth of research studies that contribute to shape our understanding of on-line social networks (OSNs)  lurking phenomena. This brief also drives the development of computational approaches that can be effectively applied to answer questions related to lurking behaviors, as well as to the engagement of lurkers in OSNs. All large-scale o...
    Disponible

    68,00 €

Otros libros del autor