1
by Grimes, Roger A.
Published 2022
Wiley
Table of Contents: ... ; Minimizing Damage ; Early Responses ; Environment Recovery ; Next Steps ; What Not to Do ; Future...

2
by Shinder, Debra Littlejohn, Tittel, Ed
Published 2002
Syngress Pub.
... computer-related security breaches resulting in damages of $124 million dollars. This data is an indication...

3
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ... do their damage and how to protect against them -- Wi-Fi security dangers and protections...

4
by Termanini, Rocky
Published 2016
Auerbach
Table of Contents: ...; Damages; Historical Background; The New Generation of Stuxnet; Cloud-Based Stuxnet: The Virus...

5
by Roberts, Scott J., Brown, Rebekah
Published 2017
O'Reilly Media
Table of Contents: ...Tools for Tracking ActionsPurpose-Built Tools; Assessing the Damage; Monitoring Life Cycle...

6
by Davidoff, Sherri
Published 2020
Addison-Wesley
... the world's most damaging breaches, Davidoff identifies proven tactics for reducing damage caused...

7
by Baesens, Bart, Van Vlasselaer, Véronique, Verbeke, Wouter
Published 2015
John Wiley & Sons, Inc.
...Early detection is a key factor in mitigating fraud damage, but it involves more specialized...

8
by Krausz, Michael
Published 2013
IT Governance Pub.
... or information breach and explains how managers can determine the business damage caused...

9
by Fichera, Joe
Published 2012
Syngress
... is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged...

10
by Taylor, Paul
Published 2009
Bloomsbury Academic
... on www.bloomsburycollections.com. This book considers the social and economic damage wrought by neo-liberalism, in Britain...

11
by Hassan, Nihad A.
Published 2019
Apress
... to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations...

12
Published 2022
Palgrave Macmillan
... attention to the damaging effects stigma can have on identity, recovery, mental health, desistance from...

13
by Gottschalk, Petter, Hamerton, Christopher
Published 2024
Palgrave Macmillan
... reputational damage and substantial breach of trust. Petter Gottschalk is Professor in the Department...

14
by Sloper, Gary, Hess, Ken
Published 2019
O'Reilly Media
... customers, lose revenue, and suffer brand damage. This practical ebook explores today's major threat...

15
by Mirkovic, Jelena, Dietrich, Sven, Dittrich, David
Published 2004
Pearson
... they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker...

16
by Carr, Jeffrey
Published 2012
O'Reilly Media
...When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small...

17
by Shannon, Ian
Published 2022
Palgrave Macmillan
... are assessed. Damaged processes of police governance that risk undermining police leadership and legitimacy...

18
by Bochman, Andrew A., Freeman, Sarah G.
Published 2021
CRC Press
... catastrophic results. From a national security perspective, it is not just the damage to the military...

19
by Woll, Cornelia
Published 2023
Princeton University Press
... embroiled in legal disputes over corruption, fraud, environmental damage, tax evasion, or sanction...

20
by Shema, Mike
Published 2012
Syngress
... and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more...