1
by Davidoff, Sherri
Published 2020
Addison-Wesley
... the world's most damaging breaches, Davidoff identifies proven tactics for reducing damage caused...

2
by Grimes, Roger A.
Published 2022
Wiley
Table of Contents: ... ; Minimizing Damage ; Early Responses ; Environment Recovery ; Next Steps ; What Not to Do ; Future...

3
by Baesens, Bart, Van Vlasselaer, Véronique, Verbeke, Wouter
Published 2015
John Wiley & Sons, Inc.
...Early detection is a key factor in mitigating fraud damage, but it involves more specialized...

4
by Krausz, Michael
Published 2013
IT Governance Pub.
... or information breach and explains how managers can determine the business damage caused...

5
by Taylor, Paul
Published 2009
Bloomsbury Academic
... on www.bloomsburycollections.com. This book considers the social and economic damage wrought by neo-liberalism, in Britain...

6
by Mirkovic, Jelena, Dietrich, Sven, Dittrich, David
Published 2004
Pearson
... they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker...

7
by Sloper, Gary, Hess, Ken
Published 2019
O'Reilly Media
... customers, lose revenue, and suffer brand damage. This practical ebook explores today's major threat...

8
by Gottschalk, Petter, Hamerton, Christopher
Published 2024
Palgrave Macmillan
... reputational damage and substantial breach of trust. Petter Gottschalk is Professor in the Department...

9
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ... do their damage and how to protect against them -- Wi-Fi security dangers and protections...

10
by Bochman, Andrew A., Freeman, Sarah G.
Published 2021
CRC Press
... catastrophic results. From a national security perspective, it is not just the damage to the military...

11
by Hassan, Nihad A.
Published 2019
Apress
... to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations...

12
by Roberts, Scott J., Brown, Rebekah
Published 2017
O'Reilly Media
Table of Contents: ...Tools for Tracking ActionsPurpose-Built Tools; Assessing the Damage; Monitoring Life Cycle...

13
by Ayala, Luis
Published 2016
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
... of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber...

14
by Woll, Cornelia
Published 2023
Princeton University Press
... embroiled in legal disputes over corruption, fraud, environmental damage, tax evasion, or sanction...

15
by Termanini, Rocky
Published 2016
Auerbach
Table of Contents: ...; Damages; Historical Background; The New Generation of Stuxnet; Cloud-Based Stuxnet: The Virus...

16
by Fichera, Joe
Published 2012
Syngress
... is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged...

17
by Shinder, Debra Littlejohn, Tittel, Ed
Published 2002
Syngress Pub.
... computer-related security breaches resulting in damages of $124 million dollars. This data is an indication...

18
Published 2022
Palgrave Macmillan
... attention to the damaging effects stigma can have on identity, recovery, mental health, desistance from...

19
by Carr, Jeffrey
Published 2012
O'Reilly Media
...When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small...

20
by Shannon, Ian
Published 2022
Palgrave Macmillan
... are assessed. Damaged processes of police governance that risk undermining police leadership and legitimacy...