Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 900 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 7 días de prueba gratis, luego $7.99 /mes
  • Cancela cuando quieras
Suscríbete ahora
Copy of Device Banner Block 894x1036 3

We Have Root: Even More Advice from Schneier on Security

11 Calificaciones

4.1

Duración
10H 53min
Idioma
Inglés
Format
Categoría

No ficción

In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments.

Bruce's writing has previously appeared in some of the world's best-known and most-respected publications, including The Atlantic, the Wall Street Journal, CNN, the New York Times, the Washington Post, Wired, and many others. And now you can enjoy his essays in one place—at your own speed and convenience.

– Timely security and privacy topics – The impact of security and privacy on our world – Perfect for fans of Bruce's blog and newsletter

The essays are written for anyone who cares about the future and implications of security and privacy for society.

© 2019 Recorded Books (Audiolibro): 9781980067689

Fecha de lanzamiento

Audiolibro: 6 de diciembre de 2019

Otros también disfrutaron...

  1. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
  2. Schneier on Security Bruce Schneier
  3. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  4. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  5. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  6. Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
  7. The Art of Deception: Controlling the Human Element of Security William L. Simon
  8. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  9. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  10. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  11. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  12. Cybersecurity For Dummies Joseph Steinberg
  13. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  14. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  15. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  16. If It's Smart, It's Vulnerable Mikko Hypponen
  17. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  18. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  19. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  20. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
  21. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  22. Cybercrime Investigators Handbook Graeme Edwards
  23. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
  24. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  25. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  26. Industry of Anonymity: Inside the Business of Cybercrime Jonathan Lusthaus
  27. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  28. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  29. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  30. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  31. Data Science John D. Kelleher
  32. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  33. Ethical Hacking Introbooks Team
  34. Artificial Intelligence For Dummies Luca Massaron
  35. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
  36. Competing in the Age of AI: Strategy and Leadership When Algorithms and Networks Run the World Karim R. Lakhani
  37. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  38. Data Science For Dummies: 2nd Edition Lillian Pierson
  39. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  40. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  41. The Deep Learning Revolution Terrence J. Sejnowski
  42. Cyber Hacking: Wars in Virtual Space Scientific American
  43. The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  44. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker Kevin Mitnick
  45. The Dark Net Jamie Bartlett
  46. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  47. Homo Deus: A Brief History of Tomorrow Yuval Noah Harari

Siempre con Storytel:

  • Acceso ilimitado

  • Modo sin conexión

  • Modo Infantil

  • Cancela en cualquier momento

Historias ilimitadas siempre
Oferta por tiempo limitado

Ilimitado

Para los que quieren escuchar y leer sin límites.

$7.99 /mes
  • 1 cuenta

  • Acceso ilimitado

  • Escucha y lee los títulos que quieras

  • Modo sin conexión + Modo Infantil

  • Cancela en cualquier momento

Pruébalo ahora