000917105 000__ 01629cam\a2200433Ki\4500 000917105 001__ 917105 000917105 005__ 20230306150652.0 000917105 006__ m\\\\\o\\d\\\\\\\\ 000917105 007__ cr\cn\nnnunnun 000917105 008__ 191113s2019\\\\nyua\\\\o\\\\\000\0\eng\d 000917105 019__ $$a1127244122 000917105 020__ $$a9781484242551$$q(electronic book) 000917105 020__ $$a1484242556$$q(electronic book) 000917105 020__ $$z9781484242544 000917105 020__ $$z1484242548 000917105 0247_ $$a10.1007/978-1-4842-4255-1$$2doi 000917105 035__ $$aSP(OCoLC)on1127393829 000917105 035__ $$aSP(OCoLC)1127393829$$z(OCoLC)1127244122 000917105 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dYDX$$dTEFOD$$dUKMGB$$dOCLCF 000917105 049__ $$aISEA 000917105 050_4 $$aQA76.76.C68$$bH37 2019eb 000917105 08204 $$a005.8/8$$223 000917105 1001_ $$aHassan, Nihad A.,$$eauthor. 000917105 24510 $$aRansomware revealed :$$ba beginner's guide to protecting and recovering from ransomware attacks /$$cby Nihad A. Hassan. 000917105 264_1 $$a[New York] :$$bApress,$$c2019. 000917105 300__ $$a1 online resource :$$billustrations 000917105 336__ $$atext$$btxt$$2rdacontent 000917105 337__ $$acomputer$$bc$$2rdamedia 000917105 338__ $$aonline resource$$bcr$$2rdacarrier 000917105 506__ $$aAccess limited to authorized users. 000917105 588__ $$aOnline resource; title from title details screen (SpringerLink, viewed November 13, 2019). 000917105 650_0 $$aMalware (Computer software) 000917105 650_0 $$aComputer security. 000917105 650_0 $$aComputer crimes$$xPrevention. 000917105 77608 $$iPrint version:$$z1484242548$$z9781484242544$$w(OCoLC)1122463017 000917105 852__ $$bebk 000917105 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-4255-1$$zOnline Access$$91397441.1 000917105 909CO $$ooai:library.usi.edu:917105$$pGLOBAL_SET 000917105 980__ $$aEBOOK 000917105 980__ $$aBIB 000917105 982__ $$aEbook 000917105 983__ $$aOnline 000917105 994__ $$a92$$bISE