להקשיב ולקרוא

היכנסו לעולם אינסופי של סיפורים

  • קראו והקשיבו כמה שאתם רוצים
  • למעלה ממיליון כותרים
  • ספרים בלעדיים + Storytel Originals
  • ניתן לבטל מתי שרוצים
להרשמה
Details page - Device banner - 894x1036
Cover for Becoming an Ethical Hacker

Becoming an Ethical Hacker

17 דירוגים

4

סדרה

1 מתוך 19

משך
3 שעות ו-47 דקות
שפה
אנגלית
פורמט
קטגוריה

התפתחות אישית

An acclaimed investigative journalist explores ethical hacking and presents a reader-friendly, informative guide to everything there is to know about entering the field of cybersecurity.

It’s impossible to ignore the critical role cybersecurity plays within our society, politics, and the global order. In Becoming an Ethical Hacker, investigative reporter Gary Rivlin offers an easy-to-digest primer on what white hat hacking is, how it began, and where it’s going, while providing vivid case studies illustrating how to become one of these “white hats” who specializes in ensuring the security of an organization’s information systems. He shows how companies pay these specialists to break into their protected systems and networks to test and assess their security. Readers will learn how these white hats use their skills to improve security by exposing vulnerabilities before malicious hackers can detect and exploit them. Weaving practical how-to advice with inspiring case studies, Rivlin provides concrete, practical steps anyone can take to pursue a career in the growing field of cybersecurity.

© 2019 Simon & Schuster Audio (ספר מוקלט): 9781508294481

תאריך פרסום

ספר מוקלט: 7 במאי 2019

תגיות

אחרים גם נהנו...

  1. The Pentester BluePrint: Starting a Career as an Ethical Hacker
    The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  2. The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
    The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age Adam Segal
  3. Find Out Anything from Anyone, Anytime: Secrets of Calculated Questioning From a Veteran Interrogator
    Find Out Anything from Anyone, Anytime: Secrets of Calculated Questioning From a Veteran Interrogator Maryann Karinch
  4. What the Luck?: The Surprising Role of Chance in Our Everyday Lives
    What the Luck?: The Surprising Role of Chance in Our Everyday Lives Gary Smith
  5. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
    Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  6. Not Always Safe: A Cyber Crime Podcast
    Not Always Safe: A Cyber Crime Podcast Neelam Jain
  7. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
    Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  8. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  9. Cybersecurity Program Development for Business: The Essential Planning Guide
    Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  10. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
    Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  11. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  12. Statistics Crash Course
    Statistics Crash Course Introbooks Team
  13. Demographics and the Demand for Higher Education
    Demographics and the Demand for Higher Education Nathan D. Grawe
  14. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  15. Data For the People: How to Make Our Post-Privacy Economy Work for You
    Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
  16. Obfuscation: A User's Guide for Privacy and Protest
    Obfuscation: A User's Guide for Privacy and Protest Finn Brunton
  17. Humans Need Not Apply: A Guide to Wealth and Work in the Age of Artificial Intelligence
    Humans Need Not Apply: A Guide to Wealth and Work in the Age of Artificial Intelligence Jerry Kaplan
  18. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  19. Overcomplicated: Technology at the Limits of Comprehension
    Overcomplicated: Technology at the Limits of Comprehension Samuel Arbesman
  20. Head In The Game: The Mental Engineering of the World's Greatest Athletes
    Head In The Game: The Mental Engineering of the World's Greatest Athletes Brandon Sneed
  21. Taming the Sun: Innovations to Harness Solar Energy and Power the Planet
    Taming the Sun: Innovations to Harness Solar Energy and Power the Planet Varun Sivaram
  22. Cultural Intelligence: Surviving and Thriving in the Global Village
    Cultural Intelligence: Surviving and Thriving in the Global Village Kerr C. Inkson
  23. Everything All at Once: How to Unleash Your Inner Nerd, Tap into Radical Curiosity and Solve Any Problem
    Everything All at Once: How to Unleash Your Inner Nerd, Tap into Radical Curiosity and Solve Any Problem Bill Nye
  24. How Charts Lie: Getting Smarter about Visual Information
    How Charts Lie: Getting Smarter about Visual Information Alberto Cairo
  25. Getting Green Done: Hard Truths From the Frontlines of Sustainability Revolution
    Getting Green Done: Hard Truths From the Frontlines of Sustainability Revolution Auden Schendler
  26. Ethical Hacking
    Ethical Hacking Introbooks Team
  27. Arguing with Idiots: How to Stop Small Minds and Big Government
    Arguing with Idiots: How to Stop Small Minds and Big Government Glenn Beck
  28. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  29. The Professor in the Cage: Why Men Fight and Why We Like to Watch
    The Professor in the Cage: Why Men Fight and Why We Like to Watch Jonathan Gottschall
  30. Blockchain and the Law: The Rule of Code
    Blockchain and the Law: The Rule of Code Aaron Wright
  31. Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets
    Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets Pablo Triana
  32. Info We Trust: How to Inspire the World with Data
    Info We Trust: How to Inspire the World with Data RJ Andrews
  33. Applied Minds: How Engineers Think
    Applied Minds: How Engineers Think Guru Madhavan
  34. Mental Health, Inc.: How Corruption, Lax Oversight, and Failed Reforms Endanger Our Most Vulnerable Citizens
    Mental Health, Inc.: How Corruption, Lax Oversight, and Failed Reforms Endanger Our Most Vulnerable Citizens Art Levine
  35. Culinary Reactions: The Everyday Chemistry of Cooking
    Culinary Reactions: The Everyday Chemistry of Cooking Simon Quellen Field
  36. Cybercrime and the Darknet: Revealing the hidden underworld of the internet
    Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  37. World 3.0: Global Prosperity and How to Achieve it
    World 3.0: Global Prosperity and How to Achieve it Pankaj Ghemewat
  38. A Practical Guide to Critical Thinking: Deciding What to Do and Believe 2nd Edition
    A Practical Guide to Critical Thinking: Deciding What to Do and Believe 2nd Edition David A. Hunter
  39. Of Privacy and Power: The Transatlantic Struggle over Freedom and Security
    Of Privacy and Power: The Transatlantic Struggle over Freedom and Security Henry Farrell
  40. Radicals
    Radicals Jamie Bartlett
  41. Inconvenient Facts: The Science That Al Gore Doesn’t Want You to Know
    Inconvenient Facts: The Science That Al Gore Doesn’t Want You to Know Gregory Wrightstone
  42. Autonomy: The Quest to Build the Driverless Car-And How It Will Reshape Our World
    Autonomy: The Quest to Build the Driverless Car-And How It Will Reshape Our World Christopher Shulgan
  43. The Code Economy: A Forty-Thousand Year History
    The Code Economy: A Forty-Thousand Year History Philip E. Auerswald
  44. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet

איזה מינוי מתאים לך?

  • מאות אלפי ספרים

  • מצב ילדים (תוכן שמתאים לקטנטנים)

  • הורדת ספרים לקריאה והאזנה בלי אינטרנט

  • אפשר לבטל בכל עת

הבחירה הכי פופולרית
המבצע בתוקף עד 15.10.2025

Unlimited

האזנה וקריאה בלי הגבלה.

49.90 ש"ח /חוֹדֶשׁ
  • חשבון 1

  • גישה בלתי מוגבלת

  • האזנה וקריאה בלי הגבלה

  • קריאה והאזנה גם בלי אינטרנט

  • אפשר לבטל בכל עת

בחירה

Family

גלו ספרים לכל המשפחה. היכנסו יחד לתוך עולם של סיפורים.

69.90 ש"ח /חוֹדֶשׁ
  • 2 חשבונות

  • גישה בלתי מוגבלת

  • שני חשבונות

  • האזנה וקריאה בלי הגבלה

  • אפשר לבטל בכל עת

נסה עכשיו