Black week: Nyt 3 kk -50%

Astu tarinoiden maailmaan

  • Pohjoismaiden suosituin ääni- ja e-kirjapalvelu
  • Uppoudu suureen valikoimaan äänikirjoja ja e-kirjoja
  • Storytel Original -sisältöjä yksinoikeudella
  • Ei sitoutumisaikaa
Lunasta tarjous
NO - Details page - Device banner - 894x1036
Cover for Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond

Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond

23 Arviota

3.7

Kesto
3T 12M
Kielet
Englanti
Formaatti
Kategoria

Tietokirjallisuus

Want to Keep Your Devices and Networks Safe from Cyberattacks with Just a Few Easy Steps? Read on. Technology can seem like a blessing or a curse. Cyber attacks are a growing problem that’s affecting an increasing number of devices and people.

The current numbers are staggering. Hackers create and deploy over 300 000 new malware programs every single day on networks, individual computers, and other devices. And there are nearly half a million ransomware attacks every year.

Cyber Security educates you on these threats and clearly walks you through the steps to prevent, detect, and respond to these attacks.

In Cyber Security, you 'll discover:

How vulnerable you are right now • and how to protect yourself within less than 24h • A simple, straight-forward security framework • for preventing, detecting, and responding to attacks • The most damaging but hard to detect attacks and what to do about it • Which unexpected device could be attacked and have life-threatening • consequences • Different types of malware and how to handle each effectively • Specific protection actions used by the FBI and CIA that you can take too • Security dangers of popular social media networks • , unknown to most users, but regularly exploited by hackers

And much more.

A lot of people resist securing their technology because it can be overwhelming. It’s not clear where to start and any instructions you do find can be confusing, frustrating, and time-consuming. The key is to keep it simple and manageable with your first foray into security.

If you want to protect your devices and networks from cyberattacks, then click the “Add to Cart” button right now.

© 2020 Matt Reyes (Äänikirja): 9781987194401

Julkaisupäivä

Äänikirja: 11. maaliskuuta 2020

Saattaisit pitää myös näistä

  1. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  2. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  3. What is the Dark Web?: The truth about the hidden part of the internet
    What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  4. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  5. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
    Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  6. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
    Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  7. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  8. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  9. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  10. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  11. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
    Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  12. New Laws of Robotics: Defending Human Expertise in the Age of AI
    New Laws of Robotics: Defending Human Expertise in the Age of AI Frank Pasquale
  13. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
    The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  14. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  15. Deep Learning
    Deep Learning John D. Kelleher
  16. The Age of AI: Artificial Intelligence and the Future of Humanity
    The Age of AI: Artificial Intelligence and the Future of Humanity Jason Thacker
  17. 3D Printing
    3D Printing John M. Jordan
  18. Data Science For Dummies: 2nd Edition
    Data Science For Dummies: 2nd Edition Lillian Pierson
  19. Cyber Hacking: Wars in Virtual Space
    Cyber Hacking: Wars in Virtual Space Scientific American
  20. The Digital Silk Road: China's Quest to Wire the World and Win the Future
    The Digital Silk Road: China's Quest to Wire the World and Win the Future Jonathan E. Hillman
  21. Virtual Reality
    Virtual Reality Samuel Greengard
  22. Basics of Statistics Explained
    Basics of Statistics Explained Introbooks Team
  23. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  24. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
    The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  25. The Vanishing American Corporation: Navigating the Hazards of a New Economy
    The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
  26. Ten Short Lessons in Artificial Intelligence and Robotics
    Ten Short Lessons in Artificial Intelligence and Robotics Peter J. Bentley
  27. Software Development Fundamentals
    Software Development Fundamentals Introbooks Team
  28. The Illusion of Control: Why Financial Crises Happen, and What We Can (and Can't) Do About It
    The Illusion of Control: Why Financial Crises Happen, and What We Can (and Can't) Do About It Jon Danielsson
  29. The Legal Analyst: A Toolkit for Thinking about the Law
    The Legal Analyst: A Toolkit for Thinking about the Law Ward Farnsworth
  30. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
    Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
  31. Social Engineering: The Science of Human Hacking 2nd Edition
    Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  32. Artificial Intelligence: Modern Magic or Dangerous Future?
    Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
  33. The Metaverse Handbook: Innovating for the Internet's Next Tectonic Shift
    The Metaverse Handbook: Innovating for the Internet's Next Tectonic Shift QuHarrison Terry
  34. The New Roaring Twenties: Prosper in Volatile Times
    The New Roaring Twenties: Prosper in Volatile Times Paul Zane Pilzer
  35. Data For the People: How to Make Our Post-Privacy Economy Work for You
    Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
  36. How Money Became Dangerous: The Inside Story of our Turbulent Relationship with Modern Finance
    How Money Became Dangerous: The Inside Story of our Turbulent Relationship with Modern Finance Christopher Varelas
  37. Blockchain For Dummies
    Blockchain For Dummies Tiana Laurence
  38. Strategy Masters: The Prince, The Art of War, and The Gallic Wars
    Strategy Masters: The Prince, The Art of War, and The Gallic Wars Julius Caesar
  39. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  40. The Money Illusion: Market Monetarism, the Great Recession, and the Future of Monetary Policy
    The Money Illusion: Market Monetarism, the Great Recession, and the Future of Monetary Policy Scott Sumner
  41. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  42. Statistics Crash Course
    Statistics Crash Course Introbooks Team
  43. Practical Statistics
    Practical Statistics Introbooks Team
  44. Deep Learning: Guide to Machine Learning and Artificial Intelligence
    Deep Learning: Guide to Machine Learning and Artificial Intelligence David Feldspar
  45. We Have Root: Even More Advice from Schneier on Security
    We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  46. The Billion Dollar Molecule: One Company's Quest for the Perfect Drug
    The Billion Dollar Molecule: One Company's Quest for the Perfect Drug Barry Werth
  47. Machine Learning
    Machine Learning Introbooks Team
  48. CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON
    CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON MARK MATTHES AND ERIC LUTZ
  49. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  50. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  51. Genentech: The Beginnings of Biotech
    Genentech: The Beginnings of Biotech Sally Smith Hughes
  52. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
    Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
  53. Artificial Intelligence For Dummies
    Artificial Intelligence For Dummies Luca Massaron
  54. Recycling
    Recycling Finn Arne Jorgensen
  55. Ludicrous: The Unvarnished Story of Tesla Motors
    Ludicrous: The Unvarnished Story of Tesla Motors Edward Niedermeyer
  56. Military Strategies and Tactics
    Military Strategies and Tactics Introbooks Team
  57. The Einstein Syndrome: Bright Children Who Talk Late
    The Einstein Syndrome: Bright Children Who Talk Late Thomas Sowell
  58. Human Work in the Age of Smart Machines
    Human Work in the Age of Smart Machines Jamie Merisotis
  59. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  60. Spatial Computing
    Spatial Computing Pamela Vold
  61. Leadership Moments from NASA: Achieving the Impossible
    Leadership Moments from NASA: Achieving the Impossible Dr. Dave Williams
  62. Liars: Falsehoods and Free Speech in an Age of Deception: Falsehoods and Free Speech in an Age of Deception
    Liars: Falsehoods and Free Speech in an Age of Deception: Falsehoods and Free Speech in an Age of Deception Cass R. Sunstein
  63. Accountable: The Rise of Citizen Capitalism
    Accountable: The Rise of Citizen Capitalism Michael O'Leary
  64. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  65. The Man Who Sold America: The Amazing but True Story of Albert D. Lasker and the Creation of the Advertising Century
    The Man Who Sold America: The Amazing but True Story of Albert D. Lasker and the Creation of the Advertising Century Arthur W. Schultz
  66. Computer Science
    Computer Science Introbooks Team
  67. Why You Won't Get Rich: How Capitalism Broke its Contract with Hard Work
    Why You Won't Get Rich: How Capitalism Broke its Contract with Hard Work Robert Verkaik
  68. Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy
    Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy Elizabeth Popp Berman
  69. How Charts Lie: Getting Smarter about Visual Information
    How Charts Lie: Getting Smarter about Visual Information Alberto Cairo
  70. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  71. Better Business: How the B Corp Movement Is Remaking Capitalism
    Better Business: How the B Corp Movement Is Remaking Capitalism Christopher Marquis
  72. Social Capital: Life online in the shadow of Ireland’s tech boom
    Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
  73. The Sephora Story: The Retail Success You Can't Make Up: The Retail Success You Can't Makeup
    The Sephora Story: The Retail Success You Can't Make Up: The Retail Success You Can't Makeup Mary Curran Hackett
  74. Thinking Like a Lawyer: A Framework for Teaching Critical Thinking to All Students
    Thinking Like a Lawyer: A Framework for Teaching Critical Thinking to All Students Colin Seale
  75. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
    Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  76. All You Can Pay: How Companies Use Our Data to Empty Our Wallets
    All You Can Pay: How Companies Use Our Data to Empty Our Wallets Anna Bernasek
  77. The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace
    The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace Eric Rauchway
  78. Running a Restaurant For Dummies
    Running a Restaurant For Dummies Heather Dismore
  79. Life After Capitalism: The Meaning of Wealth, the Future of the Economy, and the Time Theory of Money
    Life After Capitalism: The Meaning of Wealth, the Future of the Economy, and the Time Theory of Money George Gilder

Valitse tilausmalli

  • Yli miljoona tarinaa

  • Suosituksia juuri sinulle

  • Uusia Storytel Originals + eksklusiivisia sisältöjä kuukausittain

  • Turvallinen Kids Mode

  • Ei sitoutumisaikaa

Tarjous on voimassa 30.11.2025 asti

Standard

Sinulle joka kuuntelet säännöllisesti.

16.99 € /kuukausi
  • 1 käyttäjätili

  • 50 tuntia/kuukausi

  • Ei sitoutumisaikaa

Lunasta tarjous
Suosituin
Tarjous on voimassa 30.11.2025 asti

Premium

Sinulle joka kuuntelet ja luet usein.

19.99 € /kuukausi
  • 1 käyttäjätili

  • 100 tuntia/kuukausi

  • Ei sitoutumisaikaa

Lunasta tarjous

Flex

Sinulle joka kuuntelet vähemmän.

9.99 € /kuukausi
  • 1 käyttäjätili

  • 20 tuntia/kuukausi

  • Säästä käyttämättömät tunnit, max 20h

  • Ei sitoutumisaikaa

Aloita ilmainen kokeilu

Unlimited

Sinulle joka haluat rajattomasti tarinoita.

29.99 € /kuukausi
  • 1 käyttäjätili

  • Kuuntele ja lue rajattomasti

  • Ei sitoutumisaikaa

Aloita ilmainen kokeilu

Family

Kun haluat jakaa tarinoita perheen kanssa.

Alkaen 26.99 €/kuukausi
  • 2-6 tiliä

  • 100 tuntia/kk jokaiselle käyttäjälle

  • Ei sitoutumisaikaa

2 käyttäjätiliä

26.99 € /kuukausi
Aloita ilmainen kokeilu