-
Ransomware Protection Playbook
Author Roger A. Grimes
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day. In Ransomware Protection P....
Release Date 2021/10 -
Author Roger A. Grimes
Meet the world's top ethical hackers and explore the tools of the tradeHacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms ....
Release Date 2017/05 -
WINDOWS VISTA™ SECURITY: Securing Vista Against Malicious Attacks
Author Jesper M. Johansson , Roger A. Grimes
Written by two veteran Windows security experts—one a Microsoft Security MVP and Foundstone Security Consultant, and the other a former senior member of Microsoft's Security Engineering Team—this essential resource prepares end users and technical administrators to....
Release Date 2007/07 -
Author Roger A. Grimes
Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, a....
Release Date 2001/08