الاستماع والقراءة

خطوة إلى عالم لا حدود له من القصص

  • اقرأ واستمع إلى ما تريده
  • أكثر من مليون عنوان
  • العناوين الحصرية + أصول القصة
  • 7 يوم تجربة مجانية، ثم 34.99 ريال يورو في الشهر
  • من السهل الإلغاء في أي وقت
جرب مجانا
image
Cover for The Cyber Conundrum: How Do We Fix Cybersecurity?

The Cyber Conundrum: How Do We Fix Cybersecurity?

8 تقييم

2.4

المدة
2 س 37 د
اللغات
اللغة الإنجليزية
الصيغة
التصنيف

كتب واقعية

The 2016 presidential election was chaotic for many reasons. Perhaps the most troubling was news that a foreign power used new cyber warfare tactics to influence our views and skew the election. These new revelations come to light as many grow weary of a new reality where hackers always seem to be one step ahead of us. Author Peter K. Chronis claims we need a “moonshot” to bolster our cybersecurity—an astonishing achievement on the scale of wiping out polio, defeating the Nazis, or landing on the moon. The author uses inspiration and lessons from these other complex “moonshots” as a guide to help us develop a comprehensive cybersecurity strategy.

Written with a nontechnical audience in mind, The Cyber Conundrum examines the many flaws in global cybersecurity strategy and proposes solutions the tech industry, governments, and companies need to explore to address fundamental cybersecurity challenges. Without fundamental change, our democratic institutions, the critical services we rely on every day (electricity, communications, financial institutions and more), and the free flow of information are in jeopardy—making this an issue important to everyone.

© 2018 Pro Audio Voices (كتاب صوتي): 9780998749068

تاريخ النشر

الكتاب الصوتي: ٢ أكتوبر ٢٠١٨

الوسوم

    واستمتع آخرون أيضًا...

    1. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
      The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    2. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
      Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    3. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
      Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    4. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
      A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    5. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
      Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    6. Cybercrime Investigators Handbook
      Cybercrime Investigators Handbook Graeme Edwards
    7. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
      The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
    8. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
      Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    9. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
      Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
    10. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
      Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    11. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
      Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    12. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    13. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    14. What is the Dark Web?: The truth about the hidden part of the internet
      What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
    15. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    16. Data For the People: How to Make Our Post-Privacy Economy Work for You
      Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
    17. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
      The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
    18. Cybersecurity For Dummies
      Cybersecurity For Dummies Joseph Steinberg
    19. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
      Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    20. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    21. A Vulnerable System: The History of Information Security in the Computer Age
      A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    22. Digital Resilience: Is Your Company Ready for the Next Cyber Threat?
      Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
    23. Industry of Anonymity: Inside the Business of Cybercrime
      Industry of Anonymity: Inside the Business of Cybercrime Jonathan Lusthaus
    24. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
      Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
    25. All You Can Pay: How Companies Use Our Data to Empty Our Wallets
      All You Can Pay: How Companies Use Our Data to Empty Our Wallets Anna Bernasek
    26. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity
      Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
    27. Hacking: How to Hack
      Hacking: How to Hack Alex Wagner
    28. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
      CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    29. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    30. The Language of Deception: Weaponizing Next Generation AI
      The Language of Deception: Weaponizing Next Generation AI Justin Hutchens
    31. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
      Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
    32. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    33. Democratic Capitalism at the Crossroads: Technological Change and the Future of Politics
      Democratic Capitalism at the Crossroads: Technological Change and the Future of Politics Carles Boix
    34. Of Privacy and Power: The Transatlantic Struggle over Freedom and Security
      Of Privacy and Power: The Transatlantic Struggle over Freedom and Security Henry Farrell
    35. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
      The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
    36. Deep Learning
      Deep Learning John D. Kelleher
    37. The Vanishing American Corporation: Navigating the Hazards of a New Economy
      The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
    38. Fear Your Strengths: What You Are Best at Could Be Your Biggest Problem
      Fear Your Strengths: What You Are Best at Could Be Your Biggest Problem Robert D. Kaplan
    39. What the Luck?: The Surprising Role of Chance in Our Everyday Lives
      What the Luck?: The Surprising Role of Chance in Our Everyday Lives Gary Smith
    40. New Laws of Robotics: Defending Human Expertise in the Age of AI
      New Laws of Robotics: Defending Human Expertise in the Age of AI Frank Pasquale
    41. Knowledge and Power: The Information Theory of Capitalism and How It Is Revolutionizing Our World
      Knowledge and Power: The Information Theory of Capitalism and How It Is Revolutionizing Our World George Gilder
    42. Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets
      Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets Pablo Triana
    43. Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency
      Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency Finn Brunton
    44. Artificial Intelligence: Modern Magic or Dangerous Future?
      Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
    45. Cloud Computing
      Cloud Computing Nayan B. Ruparella
    46. Between Debt and the Devil: Money, Credit, and Fixing Global Finance
      Between Debt and the Devil: Money, Credit, and Fixing Global Finance Adair Turner
    47. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
      GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
    48. The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans
      The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans Bill Hammack

    دائمًا برفقة Storytel

    • أكثر من 200000 عنوان

    • وضع الأطفال (بيئة آمنة للأطفال)

    • تنزيل الكتب للوصول إليها دون الاتصال بالإنترنت

    • الإلغاء في أي وقت

    الكتب الأكثر استماعًا

    شهري

    قصص لكل المناسبات.

    34.99 ريال / شهر
    7 أيام مجانًا
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن

    سنويا

    قصص لكل المناسبات.

    299 ريال /سنة
    7 أيام مجانًا
    وفر 29%
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن

    6 أشهر

    قصص لكل المناسبات.

    192 ريال /6 أشهر
    7 أيام مجانًا
    وفر 9%
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن