Escucha y lee

Entra en un mundo infinito de historias

  • Vive la experiencia de leer y escuchar todo lo que quieras
  • Más de 650.000 títulos
  • Títulos en exclusiva y Storytel Originals
  • Primeros 14 días gratis, luego 8,99 €/mes
  • Cancela cuando quieras
Suscríbete ahora
Details page - Device banner - 894x1036
Cover for Cyber Hacking: Wars in Virtual Space

Cyber Hacking: Wars in Virtual Space

12 Valoraciones

4

Duración
4 Hora 50 min
Idioma
Inglés
Formato
Categoría

No ficción

Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is performed online. We are living digital lifestyles. While this transformation has opened up exciting new frontiers, it also opens the door to security threats undreamed of in previous generations.

In Cyber Hacking: Wars in Virtual Space, we peer behind the cyber curtain. First, we look at the hackers—who they are, how they work, their motivations, and methods. The opening article examines hardware—specifically microprocessors and why they are vulnerable to tampering. Then we turn to the internal attacks, the worms and viruses whose resulting damage ranges from merely inconvenient and attention-getting to expensive and dangerous. Next, we take a broad look at issues of privacy and the technology used to gather and track personal information. With so much personal information volunteered on social networking and other sites, how much privacy can people expect? Most of us leave a trail of data wherever we go. On a positive note, we end by covering innovative technologies used to secure cyber networks and safeguard information.

The race between the hackers and information security professionals continues.

© 2020 Blackstone Publishing (Audiolibro): 9781094075464

Fecha de lanzamiento

Audiolibro: 13 de octubre de 2020

Etiquetas

Otros también disfrutaron ...

  1. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
    Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  2. Ask the Experts: Physics and Math
    Ask the Experts: Physics and Math Scientific American
  3. System Error: Where Big Tech Went Wrong and How We Can Reboot
    System Error: Where Big Tech Went Wrong and How We Can Reboot Rob Reich
  4. Robot Rules: Regulating Artificial Intelligence
    Robot Rules: Regulating Artificial Intelligence Jacob Turner
  5. The Body Builders: Inside the Science of the Engineered Human
    The Body Builders: Inside the Science of the Engineered Human Adam Piore
  6. The Future of Energy: Earth, Wind, and Fire
    The Future of Energy: Earth, Wind, and Fire Scientific American
  7. The End of Genetics: Designing Humanity's DNA
    The End of Genetics: Designing Humanity's DNA David B. Goldstein
  8. On the Origin of Evolution: Tracing ‘Darwin’s Dangerous Idea’ from Aristotle to DNA
    On the Origin of Evolution: Tracing ‘Darwin’s Dangerous Idea’ from Aristotle to DNA John Gribbin
  9. Superpower Showdown: How the Battle between Trump and Xi Threatens a New Cold War
    Superpower Showdown: How the Battle between Trump and Xi Threatens a New Cold War Bob Davis
  10. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
    Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  11. Rockets and Ray Guns: The Sci-Fi Science of the Cold War
    Rockets and Ray Guns: The Sci-Fi Science of the Cold War Andrew May
  12. Radical Technologies: The Design of Everyday Life
    Radical Technologies: The Design of Everyday Life Adam Greenfield
  13. The Rise of the New Puritans: Fighting Back Against Progressives’ War on Fun
    The Rise of the New Puritans: Fighting Back Against Progressives’ War on Fun Noah Rothman
  14. Capitalist Punishment: How Wall Street Is Using Your Money to Create a Country You Didn't Vote For
    Capitalist Punishment: How Wall Street Is Using Your Money to Create a Country You Didn't Vote For Vivek Ramaswamy
  15. An Introduction to Information Theory: Symbols, Signals and Noise
    An Introduction to Information Theory: Symbols, Signals and Noise John R. Pierce
  16. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  17. Block by Block: The Historical and Theoretical Foundations of Thermodynamics
    Block by Block: The Historical and Theoretical Foundations of Thermodynamics Robert T. Hanlon
  18. The Future of Humankind: Why We Should be Optimistic
    The Future of Humankind: Why We Should be Optimistic John Hands
  19. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
    Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  20. Cryptography: The Key to Digital Security, How It Works, and Why It Matters
    Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  21. Profit over Privacy: How Surveillance Advertising Conquered the Internet
    Profit over Privacy: How Surveillance Advertising Conquered the Internet Matthew Crain
  22. Viral: The Search for the Origin of Covid-19
    Viral: The Search for the Origin of Covid-19 Matt Ridley
  23. The Super Age: Decoding Our Demographic Destiny
    The Super Age: Decoding Our Demographic Destiny Bradley Schurman
  24. Contraception: A Concise History
    Contraception: A Concise History Donna J. Drucker
  25. The Clock Mirage: Our Myth of Measured Time
    The Clock Mirage: Our Myth of Measured Time Joseph Mazur
  26. When the Heavens Went on Sale: The Misfits and Geniuses Racing to Put Space Within Reach
    When the Heavens Went on Sale: The Misfits and Geniuses Racing to Put Space Within Reach Ashlee Vance
  27. 2084 and the AI Revolution, Updated and Expanded Edition: How Artificial Intelligence Informs Our Future
    2084 and the AI Revolution, Updated and Expanded Edition: How Artificial Intelligence Informs Our Future John C. Lennox
  28. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  29. Ten Short Lessons in Time Travel
    Ten Short Lessons in Time Travel Brian Clegg
  30. Force: What It Means to Push and Pull, Slip and Grip, Start and Stop
    Force: What It Means to Push and Pull, Slip and Grip, Start and Stop Henry Petroski
  31. Cyber Privacy: Who Has Your Data and Why You Should Care
    Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  32. The Odd Quantum
    The Odd Quantum Sam Treiman
  33. Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced
    Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced Maurice J. Thompson
  34. A Vulnerable System: The History of Information Security in the Computer Age
    A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  35. Coders at Work: Reflections on the Craft of Programming
    Coders at Work: Reflections on the Craft of Programming Peter Seibel
  36. Artificial Intelligence: Modern Magic or Dangerous Future?
    Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
  37. Robot-Proof: Higher Education in the Age of Artificial Intelligence
    Robot-Proof: Higher Education in the Age of Artificial Intelligence Joseph E. Aoun
  38. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
    The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  39. Big Data: How the Information Revolution Is Transforming Our Lives
    Big Data: How the Information Revolution Is Transforming Our Lives Brian Clegg
  40. The Biggest Number in the World: A Journey to the Edge of Mathematics
    The Biggest Number in the World: A Journey to the Edge of Mathematics David Darling
  41. Deep Learning
    Deep Learning John D. Kelleher
  42. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  43. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
    Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  44. Cloud Computing
    Cloud Computing Nayan B. Ruparella
  45. 50 Quantum Physics Questions In Plain Simple English: Simple And Easy Answers Without Math For Beginners
    50 Quantum Physics Questions In Plain Simple English: Simple And Easy Answers Without Math For Beginners Donald B. Grey

Elige el plan:

  • Más de 650.000 títulos

  • Kids mode

  • Modo sin conexión

  • Cancela cuando quieras

¡Más popular!

Unlimited

Para los que quieren escuchar y leer sin límites.

8.99 € /mes
14 días gratis
  • 1 cuenta

  • Acceso ilimitado

  • Escucha y lee los títulos que quieras

  • Modo sin conexión + Kids Mode

  • Cancela en cualquier momento

Suscríbete ahora

Family

Para los que quieren compartir historias con su familia y amigos.

Desde 15.99 €/mes
  • 2-3 cuentas

  • Acceso ilimitado

  • Escucha y lee los títulos que quieras

  • Modo sin conexión + Kids Mode

  • Cancela en cualquier momento

2 cuentas

15.99 € /mes
Pruébalo ahora