الاستماع والقراءة

خطوة إلى عالم لا حدود له من القصص

  • اقرأ واستمع إلى ما تريده
  • أكثر من مليون عنوان
  • العناوين الحصرية + أصول القصة
  • 7 الشهر يورو في EGP89 يوم تجربة مجانية، ثم
  • من السهل الإلغاء في أي وقت
جرب مجانا
Details page - Device banner - 894x1036

Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security

المدة
6H 27دقيقة
اللغة
اللغة الإنجليزية
Format
الفئة

كتب واقعية

In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security emerges as a critical roadmap for understanding and leveraging the next wave of tech advancements. Chuck Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.

In the book, you'll:

● Gain clear, accessible explanations of cutting-edge technologies such as AI, blockchain, and quantum computing, and their impact on the business world

● Learn how to navigate the cybersecurity landscape, safeguarding your business against the vulnerabilities introduced by rapid technological progress

● Uncover the opportunities that technological advancements present for disrupting traditional industries and creating new value

Perfect for entrepreneurs, executives, technology professionals, and anyone interested in the intersection of tech and business, Inside Cyber equips you with the knowledge to lead in the digital age. Embrace the future confidently with this indispensable guide.

© 2024 Ascent Audio (دفتر الصوت ): 9781663748225

تاريخ الإصدار

دفتر الصوت : ٢٩ أكتوبر ٢٠٢٤

الوسوم

واستمتع آخرون أيضًا...

  1. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  2. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  3. Schneier on Security Bruce Schneier
  4. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  5. The Art of Deception: Controlling the Human Element of Security William L. Simon
  6. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  7. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  8. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  9. Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
  10. Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition) Amanda Berlin
  11. The Promise of Cybersecurity: From Prevention to Response: Building a Fortified Cyber Environment Olivia Martinez
  12. Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Roger A. Grimes
  13. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  14. Biggest Cyber Crimes in the History Introbooks Team
  15. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  16. The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  17. Guardians of the Virtual Realm: From Protection to Penetration: Navigating Cybersecurity and Ethical Hacking Techniques Harper Grey
  18. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  19. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  20. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  21. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  22. Cyber Security: Learn All the Essentials and Basic Ways to Avoid Cyber Risk for Your Business. Cyber Security Guide for Beginners (2021 Edition) Cole Peters
  23. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  24. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
  25. Key Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World Zachery S. Mitcham, MSA, CCISO, CSIH
  26. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  27. Cybersecurity Unveiled: The Art of Cyber Defense: A Comprehensive Guide to Protecting Your Data Benjamin Chang
  28. Cybersecurity For Dummies Joseph Steinberg
  29. The Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices Emily Foster
  30. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  31. Cybersecurity Essentials: Protecting Your Digital World Olive Sanchez
  32. Wireless Wars: China’s Dangerous Domination of 5G and How We’re Fighting Back Jonathan Pelson
  33. The Digital Silk Road: China's Quest to Wire the World and Win the Future Jonathan E. Hillman
  34. The Cybersecurity Revolution: The Ever-Changing Landscape: Adapting and Thriving in the Cyber World Michael Scott
  35. Cyber Sentinel: Bulletproofing Your Digital Defenses: Protecting Your Online Presence from Cyber Threats Rachel Evans
  36. AI + The New Human Frontier: Reimagining the Future of Time, Trust + Truth Erica Orange
  37. The Language of Deception: Weaponizing Next Generation AI Justin Hutchens
  38. CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Andrew Hutz
  39. Practical Cloud Security: A Guide for Secure Design and Deployment (2nd Edition) Chris Dotson
  40. Social Engineering for Beginners: Manipulating Minds, Securing Systems Brandon Scott
  41. AI 2024: Trends, Technologies, and Transformations David Borish
  42. Targeted: My Inside Story of Cambridge Analytica and How Trump, Brexit and Facebook Broke Democracy Brittany Kaiser
  43. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  44. Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems Martin Kleppmann
  45. Cybersecurity for Beginners: How to Defend Against Hackers & Malware ATTILA KOVACS

ما مميزات اشتراك Storytel؟

  • أكثر من 200000 عنوان

  • وضع الأطفال (بيئة آمنة للأطفال)

  • تنزيل الكتب للوصول إليها دون الاتصال بالإنترنت

  • الإلغاء في أي وقت

أكثر شهرة

شهري

قصص لكل المناسبات.

89 EGP / شهر
7 أيام مجانًا
  • حساب واحد

  • حساب بلا حدود

  • 1 حساب

  • استماع بلا حدود

  • إلغاء في أي وقت

جرب الآن

سنويا

قصص لكل المناسبات.

708 EGP /سنة
7 أيام مجانًا
وفر 33%
  • حساب واحد

  • حساب بلا حدود

  • 1 حساب

  • استماع بلا حدود

  • إلغاء في أي وقت

جرب الآن

6 أشهر

قصص لكل المناسبات.

474 EGP /ستة أشهر
7 أيام مجانًا
وفر 12%
  • حساب واحد

  • حساب بلا حدود

  • 1 حساب

  • استماع بلا حدود

  • إلغاء في أي وقت

جرب الآن