Description

Book Synopsis

Part I: Introduction to Cybersecurity.- Chapter 1: Introduction to Cybersecurity.- Chapter 2: Threat Landscape.- Chapter 3: Security Principles.- Chapter 4: Authentication in Cybersecurity.- Part II: Ransomware Basics and Prevention.- Chapter 5: Introduction to Ransomware.- Chapter 6: Ransomware Lifecycle.- Chapter 7: Ransomware Prevention.- Part III: Ransomware Detection and Response.- Chapter 8: Early Detection Techniques.- Chapter 9: Incident Response.- Chapter 10.- Threat Intelligence.- Part IV: Ransomware Recovery Strategies.- Chapter 11: Backup and Restore.- Chapter 12: Ransomware Recovery Framework.- Chapter 13: Negotiating with Attackers.- Chapter 14: Rebuilding and Strengthening Security Posture.- Part V: Real-world Perspectives.- Chapter 15: Case Studies in the E-commerce Industry.- Chapter 16: Ransomware, Inc.: The Business and Economics of Digital Extortion.- Chapter 17: Case Studies in Confidential Computing.- Chapter 18: Case Studies in Cloud Computing.- Chapter 19: Case Studies in Enterprise Security Architecture.- Chapter 20: Case Studies in Energy.- Chapter 21: Securing Digital Foundations - A Point of View on Cybersecurity in Healthcare.- Part VI: Future Trends in Cybersecurity.- Chapter 22: Future Trends in Digital Security.

Securing an Enterprise

Product form

£33.99

Includes FREE delivery

RRP £39.99 – you save £6.00 (15%)

Order before 4pm tomorrow for delivery by Thu 8 Jan 2026.

A Paperback by Saurav Bhattacharya

10 in stock


    View other formats and editions of Securing an Enterprise by Saurav Bhattacharya

    Publisher: Apress
    Publication Date: 1/2/2025
    ISBN13: 9798868810282, 979-8868810282
    ISBN10: 9798868810282

    Description

    Book Synopsis

    Part I: Introduction to Cybersecurity.- Chapter 1: Introduction to Cybersecurity.- Chapter 2: Threat Landscape.- Chapter 3: Security Principles.- Chapter 4: Authentication in Cybersecurity.- Part II: Ransomware Basics and Prevention.- Chapter 5: Introduction to Ransomware.- Chapter 6: Ransomware Lifecycle.- Chapter 7: Ransomware Prevention.- Part III: Ransomware Detection and Response.- Chapter 8: Early Detection Techniques.- Chapter 9: Incident Response.- Chapter 10.- Threat Intelligence.- Part IV: Ransomware Recovery Strategies.- Chapter 11: Backup and Restore.- Chapter 12: Ransomware Recovery Framework.- Chapter 13: Negotiating with Attackers.- Chapter 14: Rebuilding and Strengthening Security Posture.- Part V: Real-world Perspectives.- Chapter 15: Case Studies in the E-commerce Industry.- Chapter 16: Ransomware, Inc.: The Business and Economics of Digital Extortion.- Chapter 17: Case Studies in Confidential Computing.- Chapter 18: Case Studies in Cloud Computing.- Chapter 19: Case Studies in Enterprise Security Architecture.- Chapter 20: Case Studies in Energy.- Chapter 21: Securing Digital Foundations - A Point of View on Cybersecurity in Healthcare.- Part VI: Future Trends in Cybersecurity.- Chapter 22: Future Trends in Digital Security.

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account