-
Cyber Crisis
- Protecting Your Business from Real Threats in the Virtual World
- Narrado por: Michael Butler Murray
- Duración: 6 h y 28 m
Failed to add items
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
Compra ahora por US$17.19
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Los oyentes también disfrutaron...
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- De Cristen Mini en 01-15-24
De: Matthew K. Sharp, y otros
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- De Cristen Mini en 01-15-24
De: Matthew K. Sharp, y otros
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- De: Thomas J. Parenty, Jack J. Domet
- Narrado por: Jonathan Todd Ross
- Duración: 5 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- De J. M. Wilson en 10-20-20
De: Thomas J. Parenty, y otros
-
How to Measure Anything in Cybersecurity Risk
- De: Douglas W. Hubbard, Richard Seiersen
- Narrado por: Patrick Cronin
- Duración: 10 h y 21 m
- Versión completa
-
General
-
Narración:
-
Historia
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
-
Not appropriate for audio, buy a hard copy instead
- De Wanderer en 01-20-17
De: Douglas W. Hubbard, y otros
-
Blue Ocean Strategy, Expanded Edition
- How to Create Uncontested Market Space and Make the Competition Irrelevant
- De: W. Chan Kim, Renee Mauborgne
- Narrado por: Roger Wayne
- Duración: 8 h y 43 m
- Versión completa
-
General
-
Narración:
-
Historia
In this perennial best seller, embraced by organizations and industries worldwide, globally preeminent management thinkers W. Chan Kim and Renee Mauborgne challenge everything you thought you knew about the requirements for strategic success. Recognized as one of the most iconic and impactful strategy books ever written, Blue Ocean Strategy, now updated with fresh content from the authors, argues that cutthroat competition results in nothing but a bloody red ocean of rivals fighting over a shrinking profit pool.
-
-
Profoundly Insightful
- De James en 10-29-20
De: W. Chan Kim, y otros
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
Cybersecurity Leadership
- Powering the Modern Organization
- De: Mansur Hasib
- Narrado por: Mansur Hasib
- Duración: 7 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process.
-
-
CIOs and CISOs should read this book...
- De Chad L Fulgham en 08-12-15
De: Mansur Hasib
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- De: Andy Greenberg
- Narrado por: Ari Fliakos
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- De Mike Reaves en 01-28-23
De: Andy Greenberg
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- De: Perry Carpenter, Kai Roer
- Narrado por: Perry Carpenter
- Duración: 6 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
Cybersecurity Culture
- De Amazon Customer en 01-16-23
De: Perry Carpenter, y otros
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De: Christopher Hadnagy
- Narrado por: Christopher Hadnagy
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- De RM en 04-10-19
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- De: SentinelOne Publication, Migo Kedem - introduction
- Narrado por: SentinelOne
- Duración: 53 m
- Versión completa
-
General
-
Narración:
-
Historia
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
-
-
Audio Book is only about 30 minutes long
- De Brad en 06-10-23
De: SentinelOne Publication, y otros
Resumen del Editor
Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day.
Today, we live our lives - and conduct our business - online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments, and best practices. But as you read this, there is a 70 percent chance that your data is compromised...you just don't know it yet.
In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves.
No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives is both critical and vulnerable, and sooner or later, you or your company will be a target.
Más títulos del mismo
Relacionado con este tema
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Title is the best part of the book
- De Ener Systems en 06-16-19
De: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- De: Steven Levy
- Narrado por: Rich Miller
- Duración: 14 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- De Chip L. en 05-22-21
De: Steven Levy
-
Cyber War
- The Next Threat to National Security and What to Do About It
- De: Robert K. Knake, Richard A. Clarke
- Narrado por: Pete Larkin
- Duración: 10 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- De Britt Adams en 09-13-22
De: Robert K. Knake, y otros
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- De: John P. Carlin, Garrett M. Graff
- Narrado por: Kevin Stillwell
- Duración: 16 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- De Raz en 01-08-19
De: John P. Carlin, y otros
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Title is the best part of the book
- De Ener Systems en 06-16-19
De: Bruce Schneier
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- De: Steven Levy
- Narrado por: Rich Miller
- Duración: 14 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- De Chip L. en 05-22-21
De: Steven Levy
-
Cyber War
- The Next Threat to National Security and What to Do About It
- De: Robert K. Knake, Richard A. Clarke
- Narrado por: Pete Larkin
- Duración: 10 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- De Britt Adams en 09-13-22
De: Robert K. Knake, y otros
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- De: John P. Carlin, Garrett M. Graff
- Narrado por: Kevin Stillwell
- Duración: 16 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- De Raz en 01-08-19
De: John P. Carlin, y otros
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- De: Frank W. Abagnale
- Narrado por: Raymond Todd
- Duración: 7 h y 16 m
- Versión completa
-
General
-
Narración:
-
Historia
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
-
Want to Be Paranoid?
- De Sheila en 06-05-07
-
@War
- The Rise of the Military-Internet Complex
- De: Shane Harris
- Narrado por: Stephen R. Thorne
- Duración: 9 h y 43 m
- Versión completa
-
General
-
Narración:
-
Historia
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- De Greg en 02-06-15
De: Shane Harris
-
The Art of War
- De: Sun Tzu
- Narrado por: Aidan Gillen
- Duración: 1 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
The 13 chapters of The Art of War, each devoted to one aspect of warfare, were compiled by the high-ranking Chinese military general, strategist, and philosopher Sun-Tzu. In spite of its battlefield specificity, The Art of War has found new life in the modern age, with leaders in fields as wide and far-reaching as world politics, human psychology, and corporate strategy finding valuable insight in its timeworn words.
-
-
The actual book The Art of War, not a commentary
- De Fred271 en 12-31-19
De: Sun Tzu
-
Under the Bridge
- De: Rebecca Godfrey
- Narrado por: Rebecca Godfrey, Erin Moon, Mary Gaitskill - introduction
- Duración: 14 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
One moonlit night, 14-year-old Reena Virk went to join friends at a party and never returned home. In this “tour de force of crime reportage” (Kirkus Reviews), acclaimed author Rebecca Godfrey takes us into the hidden world of the seven teenage girls - and boy - accused of a savage murder. As she follows the investigation and trials, Godfrey reveals the startling truth about the unlikely killers. Laced with lyricism and insight, Under the Bridge is an unforgettable look at a haunting modern tragedy.
-
-
Powerful Account of 8 Young Teens Killing Another
- De Mary Burnight en 08-16-19
De: Rebecca Godfrey
-
The Daily Stoic
- 366 Meditations on Wisdom, Perseverance, and the Art of Living
- De: Ryan Holiday, Stephen Hanselman
- Narrado por: Brian Holsopple
- Duración: 10 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Why have history's greatest minds - from George Washington to Frederick the Great to Ralph Waldo Emerson along with today's top performers, from Super Bowl-winning football coaches to CEOs and celebrities - embraced the wisdom of the ancient Stoics? Because they realize that the most valuable wisdom is timeless and that philosophy is for living a better life, not a classroom exercise. The Daily Stoic offers a daily devotional of Stoic insights and exercises, featuring all-new translations.
-
-
Not well made as audio
- De Andreas en 12-27-16
De: Ryan Holiday, y otros
-
Fingerprints of the Gods
- The Quest Continues
- De: Graham Hancock
- Narrado por: Graham Hancock
- Duración: 18 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Fingerprints of the Gods is the revolutionary rewrite of history that has persuaded millions of listeners throughout the world to change their preconceptions about the history behind modern society. An intellectual detective story, this unique history audiobook directs probing questions at orthodox history, presenting disturbing new evidence that historians have tried - but failed - to explain.
-
-
Classic in Historical Mysteries
- De Kelly en 09-05-19
De: Graham Hancock
-
Letters from Guantánamo
- De: Mansoor Adayfi, Antonio Aiello
- Narrado por: Mansoor Adayfi, Fajer Al-Kaisi, Elias Khalil, y otros
- Duración: 3 h y 55 m
- Grabación Original
-
General
-
Narración:
-
Historia
In weeks after the September 11 attacks, 18-year-old Mansoor Adayfi was kidnapped by Afghan militia and sold to US forces for bounty money. After months of interrogations, he was sent to the US military prison at Guantánamo Bay, Cuba, as one of its first prisoners. Like the nearly 800 other men imprisoned at Guantanamo, Adayfi didn’t know why he was imprisoned or for how long. He had never seen a skyscraper and couldn’t imagine what the Twin Towers of the World Trade Center looked like, much less how they were destroyed.
-
-
The truth of it all
- De Kathy Jordan en 05-23-24
De: Mansoor Adayfi, y otros
-
This Is Not a Game with Marc Fennell
- De: Marc Fennell
- Narrado por: Marc Fennell
- Duración: 3 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
This Is Not a Game is the extraordinary untold story of the internet’s first conspiracy theory, the legend of Ong’s Hat. Marc Fennell will dive deep into a previously unexplored world of tech hippies, eccentric web subcultures and simmering paranoia, uncovering how this tongue-in-cheek artistic experiment backfired on its creator and went on to influence much of what’s wrong with the internet today.
-
-
WOW!
- De pondo en 05-09-24
De: Marc Fennell
-
Marcus Aurelius - Meditations: Adapted for the Contemporary Reader
- De: Marcus Aurelius, James Harris
- Narrado por: Gregory Allen Siders
- Duración: 4 h y 38 m
- Versión completa
-
General
-
Narración:
-
Historia
Meditations is a series of personal writings by Marcus Aurelius, Roman Emperor from 161 to 180 AD, recording his private notes to himself and ideas on Stoic philosophy. Marcus Aurelius wrote the 12 books of the Meditations as a source for his own guidance and self-improvement. These books have been carefully adapted into modern English form to allow for easy listening. Enjoy!
-
-
Best translation
- De Anonymous User en 06-13-19
De: Marcus Aurelius, y otros
-
The Prophet
- De: Kahlil Gibran
- Narrado por: Riz Ahmed
- Duración: 1 h y 25 m
- Versión completa
-
General
-
Narración:
-
Historia
On the face of it, a simple book of 26 poem fables sharing one man’s wisdom. But The Prophet is so much more than that. It has inspired people from John F Kennedy to The Beatles and became the '60s Bible of counterculture – all because of the timeless truths it shared. Each poem takes a different theme – pleasure, beauty, freedom, joy and sorrow – as the fictional Al Mustapha shares his thoughts and experiences as he prepares to travel back to his island home.
-
-
Riz Ahmed's Narraration Is So Moving!
- De Dee Tree en 09-12-21
De: Kahlil Gibran
-
The Complete Book of Five Rings
- De: Miyamoto Musashi, Kenji Tokitsu - editor/translator
- Narrado por: Brian Nishii
- Duración: 5 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
The Complete Book of Five Rings is an authoritative version of Musashi's classic The Book of Five Rings, translated and annotated by a modern martial arts master, Kenji Tokitsu. Tokitsu has spent most of his life researching the legendary samurai swordsman and his works, and in this book he illuminates this seminal text, along with several other works by Musashi.
-
-
Best translation I have encountered.
- De DW en 05-27-16
De: Miyamoto Musashi, y otros
-
The Mastery of Self
- A Toltec Guide to Personal Freedom
- De: Don Miguel Ruiz Jr.
- Narrado por: Charlie Varon
- Duración: 3 h y 30 m
- Versión completa
-
General
-
Narración:
-
Historia
The ancient Toltecs believed that life, as we perceive it, is a dream. We each live in our own personal dream, and these come together to form the dream of the planet, or the world in which we live. Problems arise when our perception of the dream becomes clouded with negativity, drama, and judgment (of ourselves and others), because it's in these moments of suffering that we have forgotten that we are the architects of our own reality and we have the power to change our dream if we choose.
-
-
listen.. .then listen again
- De Casiano en 12-22-16
Las personas que vieron esto también vieron...
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Cyber Privacy
- Who Has Your Data and Why You Should Care
- De: April Falcon Doss
- Narrado por: Chloe Cannon
- Duración: 11 h y 49 m
- Versión completa
-
General
-
Narración:
-
Historia
You shouldn't have to be a privacy expert to understand what happens to your data. April Falcon Doss, a privacy expert and former NSA and Senate lawyer, has seen this imbalance in action. In Cyber Privacy, Doss demystifies the digital footprints we leave in our daily lives and reveals how our data is being used - sometimes against us - by the private sector, the government, and even our employers and schools.
-
-
Book Worthy of Joe Biden Admin Privacy Ethics
- De J.B. en 02-17-23
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- De: P. W. Singer, Allan Friedman
- Narrado por: Sean Pratt
- Duración: 11 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- De Pascal en 03-04-17
De: P. W. Singer, y otros
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- De Cristen Mini en 01-15-24
De: Matthew K. Sharp, y otros
-
Dark Territory
- The Secret History of Cyber War
- De: Fred Kaplan
- Narrado por: Malcolm Hillgartner
- Duración: 9 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.
-
-
Best narrator - Malcolm Hillgartner
- De Greg Davis en 07-20-16
De: Fred Kaplan
-
A Vulnerable System
- The History of Information Security in the Computer Age
- De: Andrew J. Stewart
- Narrado por: Rick Adamson
- Duración: 10 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
-
Interesting overview but incredulous adoption of U.S. official propaganda
- De Kindle Customer FB en 04-24-24
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Cyber Privacy
- Who Has Your Data and Why You Should Care
- De: April Falcon Doss
- Narrado por: Chloe Cannon
- Duración: 11 h y 49 m
- Versión completa
-
General
-
Narración:
-
Historia
You shouldn't have to be a privacy expert to understand what happens to your data. April Falcon Doss, a privacy expert and former NSA and Senate lawyer, has seen this imbalance in action. In Cyber Privacy, Doss demystifies the digital footprints we leave in our daily lives and reveals how our data is being used - sometimes against us - by the private sector, the government, and even our employers and schools.
-
-
Book Worthy of Joe Biden Admin Privacy Ethics
- De J.B. en 02-17-23
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- De: P. W. Singer, Allan Friedman
- Narrado por: Sean Pratt
- Duración: 11 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- De Pascal en 03-04-17
De: P. W. Singer, y otros
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- De Cristen Mini en 01-15-24
De: Matthew K. Sharp, y otros
-
Dark Territory
- The Secret History of Cyber War
- De: Fred Kaplan
- Narrado por: Malcolm Hillgartner
- Duración: 9 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
As cyber attacks dominate front-page news, as hackers join the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.
-
-
Best narrator - Malcolm Hillgartner
- De Greg Davis en 07-20-16
De: Fred Kaplan
-
A Vulnerable System
- The History of Information Security in the Computer Age
- De: Andrew J. Stewart
- Narrado por: Rick Adamson
- Duración: 10 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
-
Interesting overview but incredulous adoption of U.S. official propaganda
- De Kindle Customer FB en 04-24-24
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
Industry of Anonymity
- Inside the Business of Cybercrime
- De: Jonathan Lusthaus
- Narrado por: David Stifel
- Duración: 11 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research in the world's technology-crime hot spots.
-
-
It's ok... but
- De Pieter en 06-21-19
-
Cybersecurity for Dummies
- De: Joseph Steinberg
- Narrado por: BJ Harrison
- Duración: 13 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- De Anonymous User en 07-09-21
De: Joseph Steinberg
-
Coders at Work
- Reflections on the Craft of Programming
- De: Peter Seibel
- Narrado por: Mitchell Dorian, full cast
- Duración: 20 h y 52 m
- Versión completa
-
General
-
Narración:
-
Historia
Peter Seibel interviews 15 of the most interesting computer programmers alive today in Coders at Work, offering a companion volume to Apress’ highly acclaimed best-seller Founders at Work by Jessica Livingston. As the words “at work” suggest, Peter Seibel focuses on how his interviewees tackle the day-to-day work of programming, while revealing much more, like how they became great programmers, how they recognize programming talent in others, and what kinds of problems they find most interesting.
-
-
Great book
- De Jay en 05-30-22
De: Peter Seibel
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- De: Kim Crawley
- Narrado por: Jo Anna Perrin
- Duración: 7 h y 49 m
- Versión completa
-
General
-
Narración:
-
Historia
In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical road map to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.
De: Kim Crawley
-
Information Architecture
- For the Web and Beyond
- De: Louis Rosenfeld, Peter Morville, Jorge Arango
- Narrado por: Theodore O'Brien
- Duración: 11 h
- Versión completa
-
General
-
Narración:
-
Historia
Information architecture (IA) is far more challenging - and necessary - than ever. To guide you through this broad ecosystem, this popular guide - now in its fourth edition - provides essential concepts, methods, and techniques for digital design that have withstood the test of time. UX designers, product managers, developers, and anyone involved in digital design will learn how to create semantic structures that will help people engage with your message.
-
-
Well organized and right to the points
- De Jessica en 06-08-23
De: Louis Rosenfeld, y otros
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De: Christopher Hadnagy
- Narrado por: Christopher Hadnagy
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- De RM en 04-10-19
-
The Death of Expertise
- The Campaign Against Established Knowledge and Why It Matters
- De: Tom Nichols
- Narrado por: Sean Pratt
- Duración: 8 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
People are now exposed to more information than ever before, provided both by technology and by increasing access to every level of education. These societal gains, however, have also helped fuel a surge in narcissistic and misguided intellectual egalitarianism that has crippled informed debates on any number of issues. Today, everyone knows everything and all voices demand to be taken with equal seriousness, and any claim to the contrary is dismissed as undemocratic elitism.
-
-
Disappointing
- De iKlick en 09-10-17
De: Tom Nichols
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- De: Gabriella Coleman
- Narrado por: Tavia Gilbert
- Duración: 13 h y 39 m
- Versión completa
-
General
-
Narración:
-
Historia
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
-
A Bit like Listening to a Police Scanner
- De J. E. JORDAN en 05-11-17
-
Metadata
- The MIT Press Essential Knowledge Series
- De: Jeffrey Pomerantz
- Narrado por: Steven Menasche
- Duración: 5 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
When "metadata" became breaking news, appearing in stories about surveillance by the National Security Agency, many members of the public encountered this once-obscure term from information science for the first time. Should people be reassured that the NSA was "only" collecting metadata about phone calls - information about the caller, the recipient, the time, the duration, the location - and not recordings of the conversations themselves? Or does phone call metadata reveal more than it seems?
-
-
This Rocks!
- De Phil F. en 07-31-20
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- De: Ben Malisow
- Narrado por: Daniel Henning
- Duración: 16 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- De Customer en 04-22-22
De: Ben Malisow
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
¿Te gustan los libros? Te encantará Audible.
Transforma tu día
Cambia el scrolling interminable por la escucha interminable. Los quehaceres pueden ser divertidos.
Escucha en dónde sea
No puedes darle vuelta a la página mientras conduces, pero puedes escuchar
Lleva toda tu biblioteca contigo
Tus historias van a donde tú vayas. Los audiolibros viajan ligero.
Escucha y aprende
Descubre historias que pueden renovar tu mente, tu bienestar y tu vida.
Alcanza tus objetivos de lectura
Descarga títulos para escucharlos sin conexión, en cualquier parte del mundo.
Encuentra tu nicho
Con miles de títulos para explorar, hay algo para todos.
Lo que los oyentes dicen sobre Cyber Crisis
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Amazon Customer
- 03-19-22
Great info!
I have always admired Dr. Cole and he did not disappoint me with this book.
Great read for all levels
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Carlos Rodriguez
- 07-17-21
Lots of good true stories
Dr. Cole uses many facts and true stories to help the reader understand the risk and he also provides practical examples of how to treat such risk. I thought about four star because I think that the book sometimes uses a bint of FUD but being in the space I cannot negate the facts.
Great book for your executive leadership team.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Amazon Customer
- 11-13-21
Extremely Informative and Insightful
I’ve been working in IT for over 25 years specifically in the Application Integration space and this book has increased my awareness to the cyber security challenges we are facing globally. I highly recommend!
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- elitegunslinger
- 04-27-22
Great insightful resource
Concise and straight to the point, great examples and suggestions to secure an environment from a high level. Check this out, you won't regret it.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Steve Bostedor
- 09-11-22
Not garbage but also not great
This book is a good starting point but the philosophies for security are a bit dated for it to have been written in 2021. There is no mention of Zero Trust principles. Least privilege was only suggested for third party accounts on your network.
The security model that is discussed is very old school network-centric. It focuses on firewalls and segmentation as the perimeter deference instead of the more modern approach of identity being the deciding perimeter. Network segmentation and firewalling is still very important in the layered approach but is no longer good enough to be the deciding factor of what is trusted and what is not. This book does not seem to acknowledge that.
If you do buy and read this book, please keep in mind that there is a new modern way to secure your assets and you should look deeply into the Zero Trust methodology where every resource request begins with a trust level of zero and increases by verifying explicitly that the request is coming from a verified account, a device that is secure, a location that is approved, and without a heuristics score that puts it all into question. We no longer trust the fact that they are on the corp network or using a company laptop or have the right password as sole trust factors. Assume that your most trusted network segments are already breached with no ability to clean them, and act accordingly.
This book also fails to talk about the modern move to passwordless authentication. There is a slight mention of tokens and multifactor but not in the context of eliminating the password from the mix all together; which is what modern enterprises are striving for. The only people who love passwords are the hackers (and apparently Eric Cole).
I don't want to discourage you from reading this book but I do want to encourage you to not make this the last book you read on this subject.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña