Ascolta tutto, gratis per 30 giorni

Approfitta dell'offerta e entra in un mondo di storie

  • Ascolta e leggi quanto vuoi
  • Oltre 400.000 titoli
  • Prova gratis per 30 giorni, poi 9.99€/mese
  • Disdici quando vuoi
  • Ascolta titoli esclusivi e Storytel Original
Prova Gratis
Device Banner Block 894x1036

Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security

Durata
6h 27min
Lingua
Inglese
Format
Categoria

Non-fiction

In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security emerges as a critical roadmap for understanding and leveraging the next wave of tech advancements. Chuck Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.

In the book, you'll:

● Gain clear, accessible explanations of cutting-edge technologies such as AI, blockchain, and quantum computing, and their impact on the business world

● Learn how to navigate the cybersecurity landscape, safeguarding your business against the vulnerabilities introduced by rapid technological progress

● Uncover the opportunities that technological advancements present for disrupting traditional industries and creating new value

Perfect for entrepreneurs, executives, technology professionals, and anyone interested in the intersection of tech and business, Inside Cyber equips you with the knowledge to lead in the digital age. Embrace the future confidently with this indispensable guide.

© 2024 Ascent Audio (Audiolibro): 9781663748225

Data di uscita

Audiolibro: 29 ottobre 2024

Potrebbero piacerti

  1. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  2. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  3. Schneier on Security Bruce Schneier
  4. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  5. The Art of Deception: Controlling the Human Element of Security William L. Simon
  6. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  7. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  8. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  9. Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
  10. Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition) Amanda Berlin
  11. The Promise of Cybersecurity: From Prevention to Response: Building a Fortified Cyber Environment Olivia Martinez
  12. Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Roger A. Grimes
  13. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  14. Biggest Cyber Crimes in the History Introbooks Team
  15. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  16. The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
  17. Guardians of the Virtual Realm: From Protection to Penetration: Navigating Cybersecurity and Ethical Hacking Techniques Harper Grey
  18. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  19. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  20. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  21. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  22. Cyber Security: Learn All the Essentials and Basic Ways to Avoid Cyber Risk for Your Business. Cyber Security Guide for Beginners (2021 Edition) Cole Peters
  23. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  24. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
  25. Key Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World Zachery S. Mitcham, MSA, CCISO, CSIH
  26. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  27. Cybersecurity Unveiled: The Art of Cyber Defense: A Comprehensive Guide to Protecting Your Data Benjamin Chang
  28. Cybersecurity For Dummies Joseph Steinberg
  29. The Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices Emily Foster
  30. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  31. Cybersecurity Essentials: Protecting Your Digital World Olive Sanchez
  32. Wireless Wars: China’s Dangerous Domination of 5G and How We’re Fighting Back Jonathan Pelson
  33. The Digital Silk Road: China's Quest to Wire the World and Win the Future Jonathan E. Hillman
  34. The Cybersecurity Revolution: The Ever-Changing Landscape: Adapting and Thriving in the Cyber World Michael Scott
  35. Cyber Sentinel: Bulletproofing Your Digital Defenses: Protecting Your Online Presence from Cyber Threats Rachel Evans
  36. AI + The New Human Frontier: Reimagining the Future of Time, Trust + Truth Erica Orange
  37. The Language of Deception: Weaponizing Next Generation AI Justin Hutchens
  38. CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Andrew Hutz
  39. Practical Cloud Security: A Guide for Secure Design and Deployment (2nd Edition) Chris Dotson
  40. Social Engineering for Beginners: Manipulating Minds, Securing Systems Brandon Scott
  41. AI 2024: Trends, Technologies, and Transformations David Borish
  42. Targeted: My Inside Story of Cambridge Analytica and How Trump, Brexit and Facebook Broke Democracy Brittany Kaiser
  43. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  44. Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems Martin Kleppmann
  45. Cybersecurity for Beginners: How to Defend Against Hackers & Malware ATTILA KOVACS

Scegli il tuo piano

  • Più di 400.000 titoli

  • Kids Mode (accesso sicuro per bambini)

  • Scarica e ascolta offline

  • Disdici quando vuoi

Il più popolare

Unlimited

La scelta migliore per 1 utente. Ascolta e leggi quanto vuoi.

9.99 € /mese
  • 1 account

  • Ascolto illimitato

  • Disdici quando vuoi

Prova Gratis Per 30 Giorni

Unlimited Annuale

12 mesi al prezzo di 9. Ascolta e leggi quanto vuoi.

89.99 € /anno
Risparmia il 25%
  • 1 account

  • Ascolto illimitato

  • Disdici quando vuoi

Prova Gratis Per 30 Giorni

Unlimited+

Storie per tutta la famiglia. Entrate insieme in un mondo di storie.

14.99 € /mese
  • 2 account

  • Ascolto illimitato

  • Disdici quando vuoi

Prova Gratis Per 30 Giorni

Basic

Per te che non sei un avido ascoltatore.

6.49 € /mese
  • 1 account

  • 10 ore/mese

  • Disdici quando vuoi

Prova Gratis Per 7 Giorni