Evansville Vanderburgh Public Library
Malware (Computer software)
Type
http://bibfra.me/vocab/lite/Concept
Label
Malware (Computer software)
Name
Malware (Computer software)
Focus
Malware (Computer software)
Actions
Share resources
Incoming Resources
Subject of
13
Ransomware revealed, a beginner's guide to protecting and recovering from ransomware attacks
Ransomware protection playbook, Roger A. Grimes
Examining the cyber threat to critical infrastructure and the American economy, hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, March 16, 2011
Ransomware protection playbook, Roger A. Grimes
Malware and computer security incidents, handling guides, Mark Borrelli, editor
Economic Development Administration, malware infections on EDA's systems were overstated and the disruption of IT operations was unwarranted
The ransomware threat landscape, prepare for, recognise and survive ransomware attacks, Alan Calder
Economic Development Administration, malware infections on EDA's systems were overstated and the disruption of IT operations was unwarranted
Digital forensics with Kali Linux, perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x, Shiva V.N. Parasram
Best practices for continuity of operations (handling destructive malware), by National Protection and Programs Directorate, Department of Homeland Security
The ransomware hunting team, a band of misfits' improbable crusade to save the world from cybercrime, Renee Dudley and Daniel Golden
Cyberterrorism after Stuxnet, Thomas M. Chen
Worm, the first digital world war, Mark Bowden
Outgoing Resources
Focus
1
Malware (Computer software)
Link Analysis