الاستماع والقراءة

خطوة إلى عالم لا حدود له من القصص

  • اقرأ واستمع إلى ما تريده
  • أكثر من مليون عنوان
  • العناوين الحصرية + أصول القصة
  • 7 يوم تجربة مجانية، ثم 34.99 ريال يورو في الشهر
  • من السهل الإلغاء في أي وقت
جرب مجانا
image

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics

16 التقييمات

4.1

المدة
11H 19دقيقة
اللغة
اللغة الإنجليزية
Format
الفئة

كتب واقعية

Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference.

Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph.

© 2020 Tantor Media (دفتر الصوت ): 9781705231920

تاريخ الإصدار

دفتر الصوت : ٣٠ يونيو ٢٠٢٠

واستمتع آخرون أيضًا...

  1. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  2. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  3. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  4. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  5. The New Rules of War: Victory in the Age of Durable Disorder Sean McFate
  6. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  7. Russians Among Us: Sleeper Cells, Ghost Stories, and the Hunt for Putin’s Spies Gordon Corera
  8. Cyberdeterrence and Cyberwar Martin C. Libicki
  9. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
  10. America’s Secret War: Inside the Hidden Worldwide Struggle between America and its Enemies George Friedman
  11. Cybersecurity For Dummies Joseph Steinberg
  12. To Catch a Spy: The Art of Counterintelligence James M. Olson
  13. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  14. I Spy: My Life in MI5 Tom Marcus
  15. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  16. The CIA as Organized Crime: How Illegal Operations Corrupt America and the World Douglas Valentine
  17. Mossad: The Greatest Missions of the Israeli Secret Service Michael Bar-Zohar
  18. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  19. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  20. Shadow State: Murder, Mayhem, and Russia's Remaking of the West Luke Harding
  21. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  22. The Art of Deception: Controlling the Human Element of Security William L. Simon
  23. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  24. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency James Bamford
  25. Three Minutes to Doomsday: An Agent, a Traitor, and the Worst Espionage Breach in U.S. History Joe Navarro
  26. Cybercrime Investigators Handbook Graeme Edwards
  27. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  28. Data Science John D. Kelleher
  29. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  30. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  31. Ghost: Confessions of a Counterterrorism Agent Fred Burton
  32. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  33. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  34. How Smart Machines Think Sean Gerrish
  35. The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity Byron Reese
  36. Fear: Trump in the White House Bob Woodward
  37. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  38. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  39. The Shadow War: Inside Russia's and China's Secret Operations to Defeat America Jim Sciutto
  40. Human Universe Professor Brian Cox
  41. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  42. The Deep Learning Revolution Terrence J. Sejnowski
  43. Homo Deus: A Brief History of Tomorrow Yuval Noah Harari

دائمًا برفقة Storytel

  • أكثر من 200000 عنوان

  • وضع الأطفال (بيئة آمنة للأطفال)

  • تنزيل الكتب للوصول إليها دون الاتصال بالإنترنت

  • الإلغاء في أي وقت

الكتب الأكثر استماعًا

شهري

قصص لكل المناسبات.

34.99 ريال / شهر
7 أيام مجانًا
  • حساب واحد

  • حساب بلا حدود

  • 1 حساب

  • استماع بلا حدود

  • إلغاء في أي وقت

جرب الآن

سنويا

قصص لكل المناسبات.

299 ريال /سنة
7 أيام مجانًا
وفر 29%
  • حساب واحد

  • حساب بلا حدود

  • 1 حساب

  • استماع بلا حدود

  • إلغاء في أي وقت

جرب الآن

6 أشهر

قصص لكل المناسبات.

192 ريال /6 أشهر
7 أيام مجانًا
وفر 9%
  • حساب واحد

  • حساب بلا حدود

  • 1 حساب

  • استماع بلا حدود

  • إلغاء في أي وقت

جرب الآن