להקשיב ולקרוא

היכנסו לעולם אינסופי של סיפורים

  • קראו והקשיבו כמה שאתם רוצים
  • למעלה ממיליון כותרים
  • ספרים בלעדיים + Storytel Originals
  • ניתן לבטל מתי שרוצים
להרשמה
Details page - Device banner - 894x1036
Cover for Exploding Data: Reclaiming Our Cyber Security in the Digital Age

Exploding Data: Reclaiming Our Cyber Security in the Digital Age

19 דירוגים

3.7

משך
6 שעות ו-47 דקות
שפה
אנגלית
פורמט
קטגוריה

עיון

In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data—more widespread by business than by government, and impossible to stop—should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy—the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.

© 2018 HighBridge Audio (ספר מוקלט): 9781684414635

תאריך פרסום

ספר מוקלט: 19 בספטמבר 2018

אחרים גם נהנו...

  1. The Mind-Body Problem
    The Mind-Body Problem Jonathan Westphal
  2. Artificial Intelligence: From Medieval Robots to Neural Networks
    Artificial Intelligence: From Medieval Robots to Neural Networks Clifford A. Pickover
  3. What is the Dark Web?: The truth about the hidden part of the internet
    What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  4. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  5. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  6. GPS
    GPS Paul E. Ceruzzi
  7. Robot-Proof: Higher Education in the Age of Artificial Intelligence
    Robot-Proof: Higher Education in the Age of Artificial Intelligence Joseph E. Aoun
  8. Recycling
    Recycling Finn Arne Jorgensen
  9. Data For the People: How to Make Our Post-Privacy Economy Work for You
    Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
  10. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
    The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  11. Future Histories: What Ada Lovelace, Tom Paine, and the Paris Commune Can Teach Us About Digital Technology
    Future Histories: What Ada Lovelace, Tom Paine, and the Paris Commune Can Teach Us About Digital Technology Lizzie O'Shea
  12. To Engineer Is Human: The Role of Failure in Successful Design
    To Engineer Is Human: The Role of Failure in Successful Design Henry Petroski
  13. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  14. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
    Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  15. Deep Learning
    Deep Learning John D. Kelleher
  16. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  17. The Age of AI: Artificial Intelligence and the Future of Humanity
    The Age of AI: Artificial Intelligence and the Future of Humanity Jason Thacker
  18. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  19. Spatial Computing
    Spatial Computing Pamela Vold
  20. What's Wrong with China
    What's Wrong with China Paul Midler
  21. The Weather Machine: A Journey Inside the Forecast
    The Weather Machine: A Journey Inside the Forecast Andrew Blum
  22. We Have Root: Even More Advice from Schneier on Security
    We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  23. New Laws of Robotics: Defending Human Expertise in the Age of AI
    New Laws of Robotics: Defending Human Expertise in the Age of AI Frank Pasquale
  24. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
    Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  25. Virtual Reality
    Virtual Reality Samuel Greengard
  26. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
    Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
  27. Radicals
    Radicals Jamie Bartlett
  28. The Digital Silk Road: China's Quest to Wire the World and Win the Future
    The Digital Silk Road: China's Quest to Wire the World and Win the Future Jonathan E. Hillman
  29. The Age of Living Machines: How Biology Will Build the Next Technology Revolution: How the Convergence of Biology and Engineering Will Build the Next Technology Revolution
    The Age of Living Machines: How Biology Will Build the Next Technology Revolution: How the Convergence of Biology and Engineering Will Build the Next Technology Revolution Susan Hockfield
  30. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
    The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  31. Memes: In Digital Culture
    Memes: In Digital Culture Limor Shifman
  32. Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets
    Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets Pablo Triana
  33. The Body Economic: Why Austerity Kills
    The Body Economic: Why Austerity Kills David Stuckler
  34. Life After Capitalism: The Meaning of Wealth, the Future of the Economy, and the Time Theory of Money
    Life After Capitalism: The Meaning of Wealth, the Future of the Economy, and the Time Theory of Money George Gilder
  35. Liars: Falsehoods and Free Speech in an Age of Deception: Falsehoods and Free Speech in an Age of Deception
    Liars: Falsehoods and Free Speech in an Age of Deception: Falsehoods and Free Speech in an Age of Deception Cass R. Sunstein
  36. Computational Thinking
    Computational Thinking Peter J. Denning
  37. All These Worlds Are Yours: The Scientific Search for Alien Life
    All These Worlds Are Yours: The Scientific Search for Alien Life Jon Willis
  38. Cybersecurity Program Development for Business: The Essential Planning Guide
    Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  39. Waves
    Waves Fredric Raichlen
  40. Ten Short Lessons in Artificial Intelligence and Robotics
    Ten Short Lessons in Artificial Intelligence and Robotics Peter J. Bentley
  41. Humans Need Not Apply: A Guide to Wealth and Work in the Age of Artificial Intelligence
    Humans Need Not Apply: A Guide to Wealth and Work in the Age of Artificial Intelligence Jerry Kaplan
  42. Information and Society
    Information and Society Michael Buckland
  43. The Billion Dollar Molecule: One Company's Quest for the Perfect Drug
    The Billion Dollar Molecule: One Company's Quest for the Perfect Drug Barry Werth
  44. The Scandal of Money: Why Wall Street Recovers but the Economy Never Does
    The Scandal of Money: Why Wall Street Recovers but the Economy Never Does George Gilder
  45. The Ethical Algorithm: The Science of Socially Aware Algorithm Design
    The Ethical Algorithm: The Science of Socially Aware Algorithm Design Michael Kearns
  46. Cybersecurity For Dummies
    Cybersecurity For Dummies Joseph Steinberg
  47. Haptics
    Haptics Lynette Jones
  48. The Captured Economy: How the Powerful Enrich Themselves, Slow Down Growth, and Increase Inequality
    The Captured Economy: How the Powerful Enrich Themselves, Slow Down Growth, and Increase Inequality Brink Lindsey
  49. Spark: The Life of Electricity and the Electricity of Life
    Spark: The Life of Electricity and the Electricity of Life Timothy J. Jorgensen
  50. System Error: Where Big Tech Went Wrong and How We Can Reboot
    System Error: Where Big Tech Went Wrong and How We Can Reboot Rob Reich
  51. The New Localism: How Cities Can Thrive in the Age of Populism
    The New Localism: How Cities Can Thrive in the Age of Populism Bruce Katz
  52. Future Rising: A Journey from the Past to the Edge of Tomorrow
    Future Rising: A Journey from the Past to the Edge of Tomorrow Andrew Maynard
  53. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  54. True or False: A CIA Analyst's Guide to Spotting Fake News
    True or False: A CIA Analyst's Guide to Spotting Fake News Cindy L. Otis
  55. How the Laser Happened: Adventures of a Scientist
    How the Laser Happened: Adventures of a Scientist Charles H. Townes
  56. How Charts Lie: Getting Smarter about Visual Information
    How Charts Lie: Getting Smarter about Visual Information Alberto Cairo
  57. How Money Became Dangerous: The Inside Story of our Turbulent Relationship with Modern Finance
    How Money Became Dangerous: The Inside Story of our Turbulent Relationship with Modern Finance Christopher Varelas
  58. Getting Gamers: The Psychology of Video Games and Their Impact on the People who Play Them
    Getting Gamers: The Psychology of Video Games and Their Impact on the People who Play Them Jamie Madigan
  59. Wireless Wars: China’s Dangerous Domination of 5G and How We’re Fighting Back
    Wireless Wars: China’s Dangerous Domination of 5G and How We’re Fighting Back Jonathan Pelson
  60. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  61. The Theory That Would Not Die: How Bayes' Rule Cracked the Enigma Code, Hunted Down Russian Submarines, and Emerged Triumphant from Two Centuries of Controversy
    The Theory That Would Not Die: How Bayes' Rule Cracked the Enigma Code, Hunted Down Russian Submarines, and Emerged Triumphant from Two Centuries of Controversy Sharon Bertsch McGrayne
  62. The Einstein Syndrome: Bright Children Who Talk Late
    The Einstein Syndrome: Bright Children Who Talk Late Thomas Sowell
  63. Point Made: How to Write Like the Nation's Top Advocates, Second Edition
    Point Made: How to Write Like the Nation's Top Advocates, Second Edition Ross Guberman
  64. The Virility Paradox: The Vast Influence of Testosterone on Our Bodies, Minds, and the World We Live In
    The Virility Paradox: The Vast Influence of Testosterone on Our Bodies, Minds, and the World We Live In Charles J. Ryan
  65. What Makes a Terrorist?: Economics and the Roots of Terrorism (10th Anniversary Edition)
    What Makes a Terrorist?: Economics and the Roots of Terrorism (10th Anniversary Edition) Alan B. Krueger
  66. They Don't Represent Us: Reclaiming Our Democracy
    They Don't Represent Us: Reclaiming Our Democracy Lawrence Lessig
  67. The Illusion of Control: Why Financial Crises Happen, and What We Can (and Can't) Do About It
    The Illusion of Control: Why Financial Crises Happen, and What We Can (and Can't) Do About It Jon Danielsson
  68. The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace
    The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace Eric Rauchway
  69. The Science Delusion: Asking the Big Questions in a Culture of Easy Answers
    The Science Delusion: Asking the Big Questions in a Culture of Easy Answers Curtis White
  70. Ludicrous: The Unvarnished Story of Tesla Motors
    Ludicrous: The Unvarnished Story of Tesla Motors Edward Niedermeyer
  71. Cyber Hacking: Wars in Virtual Space
    Cyber Hacking: Wars in Virtual Space Scientific American
  72. Risk: Why Smart People Have Dumb Accidents - And What We Can Learn From Them
    Risk: Why Smart People Have Dumb Accidents - And What We Can Learn From Them Steve Casner
  73. Artificial Intelligence: Modern Magic or Dangerous Future?
    Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
  74. The Future
    The Future Nick Montfort
  75. What the Luck?: The Surprising Role of Chance in Our Everyday Lives
    What the Luck?: The Surprising Role of Chance in Our Everyday Lives Gary Smith
  76. Human Work in the Age of Smart Machines
    Human Work in the Age of Smart Machines Jamie Merisotis
  77. The Bourgeois Virtues: Ethics for an Age of Commerce
    The Bourgeois Virtues: Ethics for an Age of Commerce Deirdre N. McCloskey
  78. The Misinformation Age: How False Beliefs Spread
    The Misinformation Age: How False Beliefs Spread Cailin O’Connor
  79. Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever
    Immortality, Inc.: Renegade Science, Silicon Valley Billions, and the Quest to Live Forever Chip Walter
  80. The Perfect Bet: How Science and Math Are Taking the Luck Out of Gambling
    The Perfect Bet: How Science and Math Are Taking the Luck Out of Gambling Adam Kucharski
  81. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
    Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  82. Darwin’s House of Cards: A Journalist’s Odyssey Through the Darwin Debates
    Darwin’s House of Cards: A Journalist’s Odyssey Through the Darwin Debates Tom Bethell

איזה מינוי מתאים לך?

  • מאות אלפי ספרים

  • מצב ילדים (תוכן שמתאים לקטנטנים)

  • הורדת ספרים לקריאה והאזנה בלי אינטרנט

  • אפשר לבטל בכל עת

הבחירה הכי פופולרית

Unlimited

האזנה וקריאה בלי הגבלה.

49.90 ש"ח /חוֹדֶשׁ
  • חשבון 1

  • גישה בלתי מוגבלת

  • האזנה וקריאה בלי הגבלה

  • קריאה והאזנה גם בלי אינטרנט

  • אפשר לבטל בכל עת

בחירה

Family

גלו ספרים לכל המשפחה. היכנסו יחד לתוך עולם של סיפורים.

69.90 ש"ח /חוֹדֶשׁ
  • 2 חשבונות

  • גישה בלתי מוגבלת

  • שני חשבונות

  • האזנה וקריאה בלי הגבלה

  • אפשר לבטל בכל עת

נסה עכשיו