Marknadens största urval
Snabb leverans

Böcker av Jack Taylor

Filter
Filter
Sortera efterSortera Populära
  • av Jack Taylor
    1 269,-

    Examines how current novels dealing with African migration address social issues, immigrant subjectivity, and the politics of migration.

  • av Jack Taylor
    275,-

    The Moralist, a classical book, has been considered essential throughout the human history, and so that this work is never forgotten we at Alpha Editions have made efforts in its preservation by republishing this book in a modern format for present and future generations. This whole book has been reformatted, retyped and designed. These books are not made of scanned copies of their original work and hence the text is clear and readable.

  • - Proven Defense Strategies for Today's Threat Landscape
    av Jack Taylor
    389,-

    In today's digital world, the threat of ransomware looms large, posing significant risks to individuals and organizations alike. Cybercriminals continue to evolve their tactics, making it crucial for individuals and businesses to adopt robust defense strategies to protect their valuable data and assets. In "Ransomware Defense Strategies - Proven Defense Strategies for Today's Threat Landscape," renowned cybersecurity expert Jack Taylor provides comprehensive guidance and practical insights to help readers safeguard against ransomware attacks. With a wealth of experience in the cybersecurity industry, Jack Taylor presents a holistic approach to ransomware defense that encompasses technical measures, employee education, incident response, and compliance considerations. The book serves as a valuable resource for IT professionals, cybersecurity practitioners, business owners, and individuals concerned about the growing ransomware threat. Divided into ten chapters, the book covers a wide range of essential topics: Chapter 1: Introduction to RansomwareLearn the fundamentals of ransomware, its history, and its impact on organizations and individuals. Gain a deep understanding of how ransomware attacks are executed and the motivation behind them. Chapter 2: Ransomware Attack AnatomyExplore the different stages of a ransomware attack, from initial compromise to encryption and ransom demand. Discover how attackers exploit vulnerabilities and gain insights into their tactics. Chapter 3: Assessing Your Security PostureLearn how to conduct a comprehensive security risk assessment to identify vulnerabilities and weak points within your infrastructure. Gain valuable insights into evaluating your organization's readiness to defend against ransomware. Chapter 4: Building a Resilient InfrastructureDiscover proven strategies for implementing robust backup strategies and disaster recovery plans. Learn how to strengthen network security and enhance endpoint security through firewalls, intrusion detection systems (IDS), antivirus solutions, and more. Chapter 5: User Awareness and TrainingUnderstand the importance of user education and awareness in preventing ransomware attacks. Explore best practices for email security, safe web browsing, and secure file sharing and collaboration. Chapter 6: Incident Response and RecoveryDevelop an effective incident response plan to mitigate the impact of a ransomware attack. Learn about initial response and containment strategies, mitigation techniques, and data recovery methods. Chapter 7: Advanced Defense TechniquesExplore advanced defense techniques such as threat intelligence, behavior-based detection, endpoint detection and response (EDR) solutions, data encryption, and deception technologies. Chapter 8: Collaboration and Information SharingUnderstand the benefits of collaborating with industry peers, security communities, and law enforcement agencies. Learn how to share threat intelligence and best practices to strengthen collective defenses. Chapter 9: Compliance and Regulatory ConsiderationsGain insights into data protection regulations and standards and learn how to incorporate compliance requirements into your ransomware defense strategies. Explore security frameworks such as NIST Cybersecurity Framework and ISO 27001. Chapter 10: Future Trends and Emerging TechnologiesStay ahead of the evolving ransomware landscape by exploring emerging trends such as Ransomware-as-a-Service (RaaS), AI-driven attacks, the role of artificial intelligence and machine learning, and the potential impact of quantum computing.

  • av Jack Taylor
    1 425,-

    This book explores British policy in Iran against a backdrop of decolonisation to demonstrate the central place this nation had in Britain's postwar imperial reorientation. Focusing on the period leading up to Operation Ajax and using a wealth of primary sources, it shows that although Iran was not part of Britain's 'rose coloured map', it was a key part of the informal empire; an imperial network sustained through economic and corporate influence. Both a critical bulwark against Soviet expansion and a vital source of oil, successive British governments sought to enhance British power in Iran during and after the Second World War. Highlighting the different forms and textures of British imperialism in the mid-20th century, Jack Taylor shows how as empire was coming to an end in regions such as India and Palestine, imperial interests were reoriented towards other, more profitable areas in the Middle East. However, this book shows that as the British sought to entrench themselves more firmly in Iran, resentment was on the rise in the form of populist nationalism. Demonstrating how British policy makers failed to understand these movements, Oil, Nationalism and British Policy in Iran shows how the US government intervened to restore Iranian autocracy. In doing so, the US supplanted Britain as the foremost power in the Persian Gulf and brought half a century of informal empire to a close.

  • av Jack Taylor & Lisa Stansfield-Taylor
    285,-

  • av Jack Taylor & Cajetan Iheka
    405 - 505,-

    Examines the representations of migration in African literature, film, and other visual media, with an eye to the stylistic features of these works as well as their contributions to debates on migration

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.