![](https://padhegaindia.in/wp-content/themes/woodmart/images/lazy.png)
Save: 10%
![](https://padhegaindia.in/wp-content/themes/woodmart/images/lazy.png)
Save: 10%
Breaking Ransomware
Publisher:
| Author:
| Language:
| Format:
Publisher:
Author:
Language:
Format:
₹999 ₹899
Save: 10%
In stock
Ships within:
In stock
ISBN:
Page Extent:
Ransomware is a type of malware that is used by cybercriminals. So, to break that malware and find loopholes, you will first have to understand the details of ransomware. If you are looking to understand the internals of ransomware and how you can analyze and detect it, then this book is for you.
This book starts with an overview of ransomware and its building blocks. The book will then help you understand the different types of cryptographic algorithms and how these encryption and decryption algorithms fit in the current ransomware architectures. Moving on, the book focuses on the ransomware architectural details and shows how malware authors handle key management. It also explores different techniques used for ransomware assessment. Lastly, the book will help you understand how to detect a loophole and crack ransomware encryption.
By the end of this book, you will be able to identify and combat the hidden weaknesses in the internal components of ransomware.
Ransomware is a type of malware that is used by cybercriminals. So, to break that malware and find loopholes, you will first have to understand the details of ransomware. If you are looking to understand the internals of ransomware and how you can analyze and detect it, then this book is for you.
This book starts with an overview of ransomware and its building blocks. The book will then help you understand the different types of cryptographic algorithms and how these encryption and decryption algorithms fit in the current ransomware architectures. Moving on, the book focuses on the ransomware architectural details and shows how malware authors handle key management. It also explores different techniques used for ransomware assessment. Lastly, the book will help you understand how to detect a loophole and crack ransomware encryption.
By the end of this book, you will be able to identify and combat the hidden weaknesses in the internal components of ransomware.
About Author
Reviews
There are no reviews yet.
Related products
Distributed Operating Systems Concept And Design (2004)
Save: 60%
Software Engineering A Practitioner’s Approach (7th Ed)
Save: 60%
RELATED PRODUCTS
Head First Java: A Brain-Friendly Guide, Third Edition
Save: 5%
Mastering Bitcoin: Programming the Open Blockchain, Second Edition
Save: 25%
Cryptography and Network Security (2nd Impression 2006)
Save: 60%
Digital Communication Fundamentals And Applications (2nd Ed)
Save: 60%
Distributed Operating Systems Concept And Design (2004)
Save: 60%
Linear Programming for Project Management Professionals
Save: 10%
Oracle Database 11G The Complete Reference (India Edition 13th 2014)
Save: 50%
Software Engineering A Practitioner’s Approach (7th Ed)
Save: 60%
The Big Score: The Billion Dollar Story Of Silicon Valley
Save: 25%
Reviews
There are no reviews yet.