Écouter et lire

Entrez dans un monde infini d'histoires

  • Lire et écouter autant que vous le voulez
  • Plus d'un million de titres
  • Titres exclusifs + créations originales Storytel
  • 14 jours d'essai gratuit, puis 9,99 € par mois
  • Annulation facile à tout moment
Essayer gratuitement
Details page - Device banner - 894x1036
Cover for Cyber Hacking: Wars in Virtual Space

Cyber Hacking: Wars in Virtual Space

12 évaluations

4

Durée
4h 50min
Langue
Anglais
Format
Catégorie

Documents et essais

Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is performed online. We are living digital lifestyles. While this transformation has opened up exciting new frontiers, it also opens the door to security threats undreamed of in previous generations.

In Cyber Hacking: Wars in Virtual Space, we peer behind the cyber curtain. First, we look at the hackers—who they are, how they work, their motivations, and methods. The opening article examines hardware—specifically microprocessors and why they are vulnerable to tampering. Then we turn to the internal attacks, the worms and viruses whose resulting damage ranges from merely inconvenient and attention-getting to expensive and dangerous. Next, we take a broad look at issues of privacy and the technology used to gather and track personal information. With so much personal information volunteered on social networking and other sites, how much privacy can people expect? Most of us leave a trail of data wherever we go. On a positive note, we end by covering innovative technologies used to secure cyber networks and safeguard information.

The race between the hackers and information security professionals continues.

© 2020 Blackstone Publishing (Livre audio): 9781094075464

Date de publication

Livre audio : 13 octobre 2020

Mots-clés

    D'autres ont également apprécié ...

    1. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
      Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    2. Ask the Experts: Physics and Math
      Ask the Experts: Physics and Math Scientific American
    3. System Error: Where Big Tech Went Wrong and How We Can Reboot
      System Error: Where Big Tech Went Wrong and How We Can Reboot Rob Reich
    4. Robot Rules: Regulating Artificial Intelligence
      Robot Rules: Regulating Artificial Intelligence Jacob Turner
    5. The Body Builders: Inside the Science of the Engineered Human
      The Body Builders: Inside the Science of the Engineered Human Adam Piore
    6. The Future of Energy: Earth, Wind, and Fire
      The Future of Energy: Earth, Wind, and Fire Scientific American
    7. The End of Genetics: Designing Humanity's DNA
      The End of Genetics: Designing Humanity's DNA David B. Goldstein
    8. On the Origin of Evolution: Tracing ‘Darwin’s Dangerous Idea’ from Aristotle to DNA
      On the Origin of Evolution: Tracing ‘Darwin’s Dangerous Idea’ from Aristotle to DNA John Gribbin
    9. Superpower Showdown: How the Battle between Trump and Xi Threatens a New Cold War
      Superpower Showdown: How the Battle between Trump and Xi Threatens a New Cold War Bob Davis
    10. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
      Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    11. Rockets and Ray Guns: The Sci-Fi Science of the Cold War
      Rockets and Ray Guns: The Sci-Fi Science of the Cold War Andrew May
    12. Radical Technologies: The Design of Everyday Life
      Radical Technologies: The Design of Everyday Life Adam Greenfield
    13. The Rise of the New Puritans: Fighting Back Against Progressives’ War on Fun
      The Rise of the New Puritans: Fighting Back Against Progressives’ War on Fun Noah Rothman
    14. Capitalist Punishment: How Wall Street Is Using Your Money to Create a Country You Didn't Vote For
      Capitalist Punishment: How Wall Street Is Using Your Money to Create a Country You Didn't Vote For Vivek Ramaswamy
    15. An Introduction to Information Theory: Symbols, Signals and Noise
      An Introduction to Information Theory: Symbols, Signals and Noise John R. Pierce
    16. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
      A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    17. Block by Block: The Historical and Theoretical Foundations of Thermodynamics
      Block by Block: The Historical and Theoretical Foundations of Thermodynamics Robert T. Hanlon
    18. The Future of Humankind: Why We Should be Optimistic
      The Future of Humankind: Why We Should be Optimistic John Hands
    19. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
      Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    20. Cryptography: The Key to Digital Security, How It Works, and Why It Matters
      Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    21. Profit over Privacy: How Surveillance Advertising Conquered the Internet
      Profit over Privacy: How Surveillance Advertising Conquered the Internet Matthew Crain
    22. Viral: The Search for the Origin of Covid-19
      Viral: The Search for the Origin of Covid-19 Matt Ridley
    23. The Super Age: Decoding Our Demographic Destiny
      The Super Age: Decoding Our Demographic Destiny Bradley Schurman
    24. Contraception: A Concise History
      Contraception: A Concise History Donna J. Drucker
    25. The Clock Mirage: Our Myth of Measured Time
      The Clock Mirage: Our Myth of Measured Time Joseph Mazur
    26. When the Heavens Went on Sale: The Misfits and Geniuses Racing to Put Space Within Reach
      When the Heavens Went on Sale: The Misfits and Geniuses Racing to Put Space Within Reach Ashlee Vance
    27. 2084 and the AI Revolution, Updated and Expanded Edition: How Artificial Intelligence Informs Our Future
      2084 and the AI Revolution, Updated and Expanded Edition: How Artificial Intelligence Informs Our Future John C. Lennox
    28. Cybersecurity For Dummies
      Cybersecurity For Dummies Joseph Steinberg
    29. Ten Short Lessons in Time Travel
      Ten Short Lessons in Time Travel Brian Clegg
    30. Force: What It Means to Push and Pull, Slip and Grip, Start and Stop
      Force: What It Means to Push and Pull, Slip and Grip, Start and Stop Henry Petroski
    31. Cyber Privacy: Who Has Your Data and Why You Should Care
      Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    32. Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced
      Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced Maurice J. Thompson
    33. A Vulnerable System: The History of Information Security in the Computer Age
      A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    34. Coders at Work: Reflections on the Craft of Programming
      Coders at Work: Reflections on the Craft of Programming Peter Seibel
    35. Artificial Intelligence: Modern Magic or Dangerous Future?
      Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
    36. Robot-Proof: Higher Education in the Age of Artificial Intelligence
      Robot-Proof: Higher Education in the Age of Artificial Intelligence Joseph E. Aoun
    37. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
      The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    38. Big Data: How the Information Revolution Is Transforming Our Lives
      Big Data: How the Information Revolution Is Transforming Our Lives Brian Clegg
    39. The Biggest Number in the World: A Journey to the Edge of Mathematics
      The Biggest Number in the World: A Journey to the Edge of Mathematics David Darling
    40. Deep Learning
      Deep Learning John D. Kelleher
    41. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
      Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    42. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
      Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    43. Cloud Computing
      Cloud Computing Nayan B. Ruparella
    44. 50 Quantum Physics Questions In Plain Simple English: Simple And Easy Answers Without Math For Beginners
      50 Quantum Physics Questions In Plain Simple English: Simple And Easy Answers Without Math For Beginners Donald B. Grey

    L’offre Storytel :

    • Accès à la bibliothèque complète

    • Mode enfant

    • Annulez à tout moment

    15 heures

    Pour accompagner vos loisirs

    9.99€ /mois
    30 jours gratuits
    • 1 compte

    • 15 heures/mois

    Essayer maintenant

    30 heures

    Pour vos trajets quotidiens

    14.99€ /mois
    30 jours gratuits
    • 1 compte

    • 30 heures/mois

    Essayer maintenant

    45 heures

    Pour écouter tous les jours

    17.99€ /mois
    30 jours gratuits
    • 1 compte

    • 45 heures/mois

    Essayer maintenant