Defend your business, protect your livelihood, safeguard your future.
Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits to create malware are now readily available to anyone wishing to defraud and do damage. For your business to survive and thrive, it is vital to stay informed about the threats and the risks, and arm yourself against them.
Know your enemy
An Introduction to Hacking Crimewareis a comprehensive guide to the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.
In this pocket guide, the author:
defines exactly what crimeware is – both intentional and unintentional – and gives specific, up-to-date examples to help you identify the risks and protect your business
explores the increasing use of COTS tools as hacking tools, exposing the enemy's tactics gives practical suggestions as to how you can fight back
provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business.
Table of contents
- About The Author
- Chapter 1: Background
- Chapter 2: Crimeware Products
- Chapter 3: Unintentional Crimeware
- Chapter 4: The Present and The Future
- Chapter 5: Fighting Back
- Authoritative Sources Of Information
- ITG Resources
- Title: An Introduction to Hacking and Crimeware
- Release date: January 2012
- Publisher(s): IT Governance Publishing
- ISBN: 9781849283304
You might also like
Ethical Hacking and Penetration Testing Guide
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to …
Hacking the Hacker
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker …
Tribe of Hackers Red Team
Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. …
The Web Application Hacker's Handbook, 2nd Edition
The highly successful security book returns with a new edition, completely updated Web applications are the …