Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 900 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 7 días de prueba gratis, luego $7.99 /mes
  • Cancela cuando quieras
Suscríbete ahora
Copy of Device Banner Block 894x1036 3

We Have Root: Even More Advice from Schneier on Security

11 Calificaciones

4.1

Duración
10H 53min
Idioma
Inglés
Format
Categoría

No ficción

In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments.

Bruce's writing has previously appeared in some of the world's best-known and most-respected publications, including The Atlantic, the Wall Street Journal, CNN, the New York Times, the Washington Post, Wired, and many others. And now you can enjoy his essays in one place—at your own speed and convenience.

– Timely security and privacy topics – The impact of security and privacy on our world – Perfect for fans of Bruce's blog and newsletter

The essays are written for anyone who cares about the future and implications of security and privacy for society.

© 2019 Recorded Books (Audiolibro): 9781980067689

Fecha de lanzamiento

Audiolibro: 6 de diciembre de 2019

Otros también disfrutaron...

  1. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
  2. Schneier on Security Bruce Schneier
  3. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  4. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  5. The Art of Deception: Controlling the Human Element of Security William L. Simon
  6. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  7. Cybersecurity For Dummies Joseph Steinberg
  8. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  9. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  10. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  11. If It's Smart, It's Vulnerable Mikko Hypponen
  12. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  13. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  14. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  15. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  16. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
  17. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  18. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  19. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
  20. Cybercrime Investigators Handbook Graeme Edwards
  21. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  22. Cyberdeterrence and Cyberwar Martin C. Libicki
  23. Industry of Anonymity: Inside the Business of Cybercrime Jonathan Lusthaus
  24. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  25. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  26. Data Science John D. Kelleher
  27. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  28. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  29. Ethical Hacking Introbooks Team
  30. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  31. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  32. Computational Thinking Peter J. Denning
  33. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  34. Data Science For Dummies: 2nd Edition Lillian Pierson
  35. Artificial Intelligence For Dummies Luca Massaron
  36. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
  37. Competing in the Age of AI: Strategy and Leadership When Algorithms and Networks Run the World Karim R. Lakhani
  38. The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  39. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  40. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  41. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  42. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  43. The Deep Learning Revolution Terrence J. Sejnowski
  44. The Dark Net Jamie Bartlett
  45. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker Kevin Mitnick

Siempre con Storytel:

  • Acceso ilimitado

  • Modo sin conexión

  • Modo Infantil

  • Cancela en cualquier momento

Historias ilimitadas siempre
Oferta por tiempo limitado

Ilimitado

Para los que quieren escuchar y leer sin límites.

$7.99 /mes
  • 1 cuenta

  • Acceso ilimitado

  • Escucha y lee los títulos que quieras

  • Modo sin conexión + Modo Infantil

  • Cancela en cualquier momento

Pruébalo ahora