Muestra
  • The Hidden Corporation

  • A Data Management Security Novel
  • De: David Schlesinger
  • Narrado por: Bobby Hundley
  • Duración: 5 h y 38 m
  • 4.6 out of 5 stars (8 calificaciones)

Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.
The Hidden Corporation  Por  arte de portada

The Hidden Corporation

De: David Schlesinger
Narrado por: Bobby Hundley
Prueba por $0.00

$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por $19.95

Compra ahora por $19.95

la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.
activate_primeday_promo_in_buybox_DT

Resumen del Editor

If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss.

Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information, yet discovers hidden data security gaps in her corporation while investigating a data theft.

The world's first data security business novel is an accessible way to illuminate hidden data dangers while explaining some of the cybersecurity challenges of today.

Called into her boss's office early one morning, Nancy MacBaron is given dual assignments: one, to help locate the person who is holding their data for ransom, and two, investigate how their information management process allowed such a huge amount of sensitive information to be stolen. Amidst the rivalry among departments, and the pressure of financial disaster for the company, Nancy begins a journey of discovery that shows her a landscape of data process activity that nobody is coordinating or even really aware exists.

Nancy confers with a number of people, some helpful, some resentful of outsiders, all adding more pieces to the puzzle. Amidst the new ideas, old work habits, and personal conflicts Nancy begins to recognize hidden and ungoverned gaps within the corporation along with following clues to find the criminal before the company's data is auctioned off to the highest bidder.

Follow Nancy as she gathers different perspectives from developers, data architects, managers, attorneys, cybersecurity specialists, data governance groups, law enforcement, and members of her own family to formulate a method to protect sensitive information that coordinates the expertise of many business groups to eliminate gaps in The Hidden Corporation.

©2011 David Schlesinger (P)2016 Technics Publications

Más títulos del mismo

Lo que los oyentes dicen sobre The Hidden Corporation

Calificaciones medias de los clientes
Total
  • 4.5 out of 5 stars
  • 5 estrellas
    7
  • 4 estrellas
    0
  • 3 estrellas
    0
  • 2 estrellas
    1
  • 1 estrella
    0
Ejecución
  • 4.5 out of 5 stars
  • 5 estrellas
    5
  • 4 estrellas
    1
  • 3 estrellas
    0
  • 2 estrellas
    0
  • 1 estrella
    1
Historia
  • 4.5 out of 5 stars
  • 5 estrellas
    5
  • 4 estrellas
    0
  • 3 estrellas
    0
  • 2 estrellas
    1
  • 1 estrella
    0

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.

Ordenar por:
Filtrar por:
  • Total
    2 out of 5 stars
  • Ejecución
    1 out of 5 stars
  • Historia
    2 out of 5 stars

Amateurishly written and performed

Imagine how an information security professional might write fiction and you've pretty much nailed this book. It reads alternately like a CISSP study guide and bad Internet fan fiction.

The "heroine" of the book (who is supposed to be an accomplished CISSP and security professional) often seems perplexed by concepts she would have had to know simply to pass the CISSP exam. While the text does contain a great deal of good factual information, I feel like it's lost on the target audience (current and aspiring CISSPs.)

The performance of the voice artist is worse. He presents caricatures of various nationalities when trying to use distinct voices for each character.

I would recommend this book to those InfoSec professionals who have just begun prep work for the CISSP exam and who can disregard the bad voice acting and 11th grade writing style.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña