Book description
Defend your business, protect your livelihood, safeguard your future.
Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits to create malware are now readily available to anyone wishing to defraud and do damage. For your business to survive and thrive, it is vital to stay informed about the threats and the risks, and arm yourself against them.
Know your enemy
An Introduction to Hacking Crimewareis a comprehensive guide to the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.
Fighting back
In this pocket guide, the author:
defines exactly what crimeware is – both intentional and unintentional – and gives specific, up-to-date examples to help you identify the risks and protect your business
explores the increasing use of COTS tools as hacking tools, exposing the enemy's tactics gives practical suggestions as to how you can fight back
provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business.
Table of contents
- Cover
- Title
- Copyright
- Preface
- About The Author
- Acknowledgements
- Contents
- Introduction
- Chapter 1: Background
- Chapter 2: Crimeware Products
- Chapter 3: Unintentional Crimeware
- Chapter 4: The Present and The Future
- Chapter 5: Fighting Back
- Conclusion
- Authoritative Sources Of Information
- Bibliography
- ITG Resources
Product information
- Title: An Introduction to Hacking and Crimeware
- Author(s):
- Release date: January 2012
- Publisher(s): IT Governance Publishing
- ISBN: 9781849283304
You might also like
book
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare …
book
Enterprise Mac Security: Mac OS X Snow Leopard
A common misconception in the Mac community is that Mac's operating system is more secure than …
book
Case Studies in Secure Computing
In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies …
book
Enterprise Mac Security: El Capitan, Third Edition
A common misconception in the Mac community is that Mac’s operating system is more secure than …