Kuuntele missä ja milloin haluat

Astu tarinoiden maailmaan

  • Pohjoismaiden suosituin ääni- ja e-kirjapalvelu
  • Uppoudu suureen valikoimaan äänikirjoja, e-kirjoja ja podcasteja
  • Storytel Original -sisältöjä yksinoikeudella
  • Ei sitoutumisaikaa
Lunasta tarjous
NO - Details page - Device banner - 894x1036
Cover for Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

19 Arviota

3.2

Kesto
10T 46M
Kielet
Englanti
Formaatti
Kategoria

Tietokirjallisuus

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

● Go deep into the world of white hat hacking to grasp just how critical cybersecurity is

● Read the stories of some of the world's most renowned computer security experts

● Delve into social engineering, cryptography, penetration testing, network attacks, and more

As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

© 2019 Tantor Media (Äänikirja): 9781515949848

Julkaisupäivä

Äänikirja: 8. lokakuuta 2019

Saattaisit pitää myös näistä

  1. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
    The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  2. Cyber Hacking: Wars in Virtual Space
    Cyber Hacking: Wars in Virtual Space Scientific American
  3. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
    Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  4. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
    Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  5. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  6. A Vulnerable System: The History of Information Security in the Computer Age
    A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  7. Analysis of Genuine Karate 2: Sociocultural Development, Commercialization, and Loss of Essential Knowledge
    Analysis of Genuine Karate 2: Sociocultural Development, Commercialization, and Loss of Essential Knowledge Hermann Bayer
  8. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  9. Artificial Intelligence: Modern Magic or Dangerous Future?
    Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
  10. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  11. What is the Dark Web?: The truth about the hidden part of the internet
    What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  12. The Future of Energy
    The Future of Energy Scientific American
  13. Future Minds: The Rise of Intelligence, from the Big Bang to the End of the Universe
    Future Minds: The Rise of Intelligence, from the Big Bang to the End of the Universe Richard Yonck
  14. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  15. Deep Learning
    Deep Learning John D. Kelleher
  16. Self-Tracking
    Self-Tracking Dawn Nafus
  17. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
    Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  18. The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans
    The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans Bill Hammack
  19. Outside the Box: How Globaliszation Changed from Moving Stuff to Spreading Ideas: How Globalization Changed from Moving Stuff to Spreading Ideas
    Outside the Box: How Globaliszation Changed from Moving Stuff to Spreading Ideas: How Globalization Changed from Moving Stuff to Spreading Ideas Marc Levinson
  20. Robot-Proof: Higher Education in the Age of Artificial Intelligence
    Robot-Proof: Higher Education in the Age of Artificial Intelligence Joseph E. Aoun
  21. When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet
    When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet Handel Jones
  22. Extraterrestrials
    Extraterrestrials Wade Roush
  23. The Body Builders: Inside the Science of the Engineered Human
    The Body Builders: Inside the Science of the Engineered Human Adam Piore
  24. Cryptography: The Key to Digital Security, How It Works, and Why It Matters
    Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  25. What the Luck?: The Surprising Role of Chance in Our Everyday Lives
    What the Luck?: The Surprising Role of Chance in Our Everyday Lives Gary Smith
  26. CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON
    CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON MARK MATTHES AND ERIC LUTZ
  27. Facing Violence: Preparing for the Unexpected
    Facing Violence: Preparing for the Unexpected Rory Miller
  28. Averting Catastrophe: Decision Theory for COVID-19, Climate Change, and Potential Disasters of All Kinds
    Averting Catastrophe: Decision Theory for COVID-19, Climate Change, and Potential Disasters of All Kinds Cass R. Sunstein
  29. Cyber Privacy: Who Has Your Data and Why You Should Care
    Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  30. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  31. Martin Gardner: The Magic and Mystery of Numbers
    Martin Gardner: The Magic and Mystery of Numbers Scientific American
  32. Liars and Outliers: Enabling the Trust that Society Needs to Thrive
    Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
  33. Straight Talk on Trade: Ideas for a Sane World Economy
    Straight Talk on Trade: Ideas for a Sane World Economy Dani Rodrik
  34. AI and Genius Machines
    AI and Genius Machines Scientific American
  35. Can I See your Hands: A Guide To Situational Awareness, Personal Risk Management, Resilience and Security
    Can I See your Hands: A Guide To Situational Awareness, Personal Risk Management, Resilience and Security Dr. Gav Schneider
  36. The Case Against Socialism
    The Case Against Socialism Rand Paul
  37. Measurement
    Measurement Paul Lockhart
  38. Endgame: Bobby Fischer’s Remarkable Rise and Fall—from America’s Brightest Prodigy to the Edge of Madness
    Endgame: Bobby Fischer’s Remarkable Rise and Fall—from America’s Brightest Prodigy to the Edge of Madness Frank Brady
  39. Fraud: An American History from Barnum to Madoff
    Fraud: An American History from Barnum to Madoff Edward J. Balleisen
  40. Designing the Urban Future: Smart Cities
    Designing the Urban Future: Smart Cities Scientific American
  41. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
    The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  42. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  43. Big Data: How the Information Revolution Is Transforming Our Lives
    Big Data: How the Information Revolution Is Transforming Our Lives Brian Clegg
  44. Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced
    Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced Maurice J. Thompson
  45. Of Privacy and Power: The Transatlantic Struggle over Freedom and Security
    Of Privacy and Power: The Transatlantic Struggle over Freedom and Security Henry Farrell
  46. Climate Change and Extreme Weather
    Climate Change and Extreme Weather Scientific American
  47. Cogs and Monsters: What Economics Is, and What It Should Be
    Cogs and Monsters: What Economics Is, and What It Should Be Diane Coyle
  48. Social Engineering: The Science of Human Hacking 2nd Edition
    Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  49. Protocol: The Power of Diplomacy and How to Make It Work for You
    Protocol: The Power of Diplomacy and How to Make It Work for You Capricia Penavic Marshall
  50. The Ethics of Influence: Government in the Age of Behavioral Science
    The Ethics of Influence: Government in the Age of Behavioral Science Cass R. Sunstein
  51. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  52. Machine Learning: Deep Learning, Text Analytics, and Reinforcement Learning with Big Data
    Machine Learning: Deep Learning, Text Analytics, and Reinforcement Learning with Big Data David Feldspar
  53. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
    Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  54. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  55. The New Roaring Twenties: Prosper in Volatile Times
    The New Roaring Twenties: Prosper in Volatile Times Paul Zane Pilzer
  56. System Error: Where Big Tech Went Wrong and How We Can Reboot
    System Error: Where Big Tech Went Wrong and How We Can Reboot Rob Reich
  57. Borrowed Time: Two Centuries of Booms, Busts, and Bailouts at Citi
    Borrowed Time: Two Centuries of Booms, Busts, and Bailouts at Citi James Freeman
  58. Make It New: The History of Silicon Valley Design
    Make It New: The History of Silicon Valley Design Barry Katz
  59. 50 Quantum Physics Questions In Plain Simple English: Simple And Easy Answers Without Math For Beginners
    50 Quantum Physics Questions In Plain Simple English: Simple And Easy Answers Without Math For Beginners Donald B. Grey
  60. 3D Printing
    3D Printing John M. Jordan
  61. Sensible Politics: Visualizing International Relations
    Sensible Politics: Visualizing International Relations William A. Callahan
  62. Seven Crashes: The Economic Crises That Shaped Globalization
    Seven Crashes: The Economic Crises That Shaped Globalization Harold James
  63. Radical Technologies: The Design of Everyday Life
    Radical Technologies: The Design of Everyday Life Adam Greenfield
  64. Inventor of the Future: The Visionary Life of Buckminster Fuller
    Inventor of the Future: The Visionary Life of Buckminster Fuller Alec Nevala-Lee
  65. An Introduction to Information Theory: Symbols, Signals and Noise
    An Introduction to Information Theory: Symbols, Signals and Noise John R. Pierce
  66. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  67. The Biggest Number in the World: A Journey to the Edge of Mathematics
    The Biggest Number in the World: A Journey to the Edge of Mathematics David Darling
  68. Ask the Experts: Physics and Math
    Ask the Experts: Physics and Math Scientific American
  69. When the Heavens Went on Sale: The Misfits and Geniuses Racing to Put Space Within Reach
    When the Heavens Went on Sale: The Misfits and Geniuses Racing to Put Space Within Reach Ashlee Vance
  70. How It All Ends
    How It All Ends Scientific American
  71. Superpower Showdown: How the Battle between Trump and Xi Threatens a New Cold War
    Superpower Showdown: How the Battle between Trump and Xi Threatens a New Cold War Bob Davis
  72. Law and Leviathan: Redeeming the Administrative State
    Law and Leviathan: Redeeming the Administrative State Adrian Vermeule
  73. Inflation: What It Is, Why It's Bad, and How to Fix It
    Inflation: What It Is, Why It's Bad, and How to Fix It Steve Forbes
  74. The Future of Humankind: Why We Should be Optimistic
    The Future of Humankind: Why We Should be Optimistic John Hands
  75. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  76. 2084 and the AI Revolution, Updated and Expanded Edition: How Artificial Intelligence Informs Our Future
    2084 and the AI Revolution, Updated and Expanded Edition: How Artificial Intelligence Informs Our Future John C. Lennox
  77. The Enlightened Capitalists: Cautionary Tales of Business Pioneers Who Tried to Do Well by Doing Good
    The Enlightened Capitalists: Cautionary Tales of Business Pioneers Who Tried to Do Well by Doing Good James O'Toole
  78. How to Survive: Lessons for Everyday Life from the Extreme World
    How to Survive: Lessons for Everyday Life from the Extreme World John Hudson
  79. Profit over Privacy: How Surveillance Advertising Conquered the Internet
    Profit over Privacy: How Surveillance Advertising Conquered the Internet Matthew Crain
  80. Zero: The Biography of a Dangerous Idea
    Zero: The Biography of a Dangerous Idea Charles Seife
  81. Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity
    Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity Robert Hannigan
  82. The Clock Mirage: Our Myth of Measured Time
    The Clock Mirage: Our Myth of Measured Time Joseph Mazur
  83. Coders at Work: Reflections on the Craft of Programming
    Coders at Work: Reflections on the Craft of Programming Peter Seibel
  84. China: The Bubble That Never Pops
    China: The Bubble That Never Pops Thomas Orlik
  85. The Science behind the Debates
    The Science behind the Debates Scientific American
  86. Arriving Today: From Factory to Front Door: Why Everything Has Changed About How and What We Buy
    Arriving Today: From Factory to Front Door: Why Everything Has Changed About How and What We Buy Christopher Mims
  87. The Delusions Of Crowds: Why People Go Mad in Groups
    The Delusions Of Crowds: Why People Go Mad in Groups William J. Bernstein
  88. Game Theory: Understanding the Mathematics of Life
    Game Theory: Understanding the Mathematics of Life Brian Clegg
  89. Capitalist Punishment: How Wall Street Is Using Your Money to Create a Country You Didn't Vote For
    Capitalist Punishment: How Wall Street Is Using Your Money to Create a Country You Didn't Vote For Vivek Ramaswamy

Valitse tilausmalli

  • Yli miljoona tarinaa

  • Suosituksia juuri sinulle

  • Uusia Storytel Originals + eksklusiivisia sisältöjä kuukausittain

  • Turvallinen Kids Mode

  • Ei sitoutumisaikaa

Standard

Sinulle joka kuuntelet säännöllisesti.

16.99 € /kuukausi
  • 1 käyttäjätili

  • 50 tuntia/kuukausi

  • Ei sitoutumisaikaa

Lunasta tarjous
Suosituin

Premium

Sinulle joka kuuntelet ja luet usein.

19.99 € /kuukausi
  • 1 käyttäjätili

  • 100 tuntia/kuukausi

  • Ei sitoutumisaikaa

Lunasta tarjous

Flex

Sinulle joka kuuntelet vähemmän.

9.99 € /kuukausi
  • 1 käyttäjätili

  • 20 tuntia/kuukausi

  • Säästä käyttämättömät tunnit, max 20h

  • Ei sitoutumisaikaa

Aloita ilmainen kokeilu

Unlimited

Sinulle joka haluat rajattomasti tarinoita.

29.99 € /kuukausi
  • 1 käyttäjätili

  • Kuuntele ja lue rajattomasti

  • Ei sitoutumisaikaa

Aloita ilmainen kokeilu

Family

Kun haluat jakaa tarinoita perheen kanssa.

Alkaen 26.99 €/kuukausi
  • 2-6 tiliä

  • 100 tuntia/kk jokaiselle käyttäjälle

  • Ei sitoutumisaikaa

2 käyttäjätiliä

26.99 € /kuukausi
Aloita ilmainen kokeilu