Skip to main content

Topic outline

  • Chapter 1: Concept and Types of Malware

  • Chapter 2: Malware and Hacking

  • Chapter 3: Hacker vs. Individuals and Enterprises

  • Chapter 4: Reasons Hackers Target Enterprises

  • Chapter 5: Protect Data! Sandbox Detection Technology 1

  • Chapter 6: Protect Data! Sandbox Detection Technology 2

  • Chapter 7: Protect Data! Next-Generation Vaccine Solutions

  • Chapter 8: Watering Hole Attack!?

  • Chapter 9: Impact of Ransomware on Work

  • Chapter 10: Can Ransomware Be Stopped?

  • Chapter 11: Measures to Minimize Ransomware Damage in Enterprises

  • Chapter 12: Responding to DDoS Attacks

  • Chapter 13: Responding to Spear Phishing Attacks

  • Chapter 14: Persistent Threat APT Harassing Enterprises for Long Time

  • Chapter 15: Response Measures to Intelligent Persistent Attacks

  • Chapter 16: Technology Leakage in the Era of Smart Factory

  • Chapter 17: Essential Systems in the Era of Smart Factory

  • Chapter 18: Smart Factory Guidelines

  • Chapter 19: 4th Industrial Revolution Technology and Software Security

  • Chapter 20: 4th Industrial Revolution Technology and Automotive Security

  • Chapter 21: 4th Industrial Revolution Technology and AI Security

  • Chapter 22: 4th Industrial Revolution Technology and IoT Security

  • Chapter 23: 4th Industrial Revolution Technology and Next-Generation Security Intelligence