Lyssna när som helst, var som helst

Kliv in i en oändlig värld av stories

  • 1 miljon stories
  • Hundratals nya stories varje vecka
  • Få tillgång till exklusivt innehåll
  • Avsluta när du vill
Starta erbjudandet
SE - Details page - Device banner - 894x1036
Cover for Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

19 betyg

3.2

Längd
10T 46min
Språk
Engelska
Format
Kategori

Fakta

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

● Go deep into the world of white hat hacking to grasp just how critical cybersecurity is

● Read the stories of some of the world's most renowned computer security experts

● Delve into social engineering, cryptography, penetration testing, network attacks, and more

As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

© 2019 Tantor Media (Ljudbok): 9781515949848

Utgivningsdatum

Ljudbok: 8 oktober 2019

Andra gillade också ...

  1. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
    Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  2. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
    Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  3. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  4. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  5. A Vulnerable System: The History of Information Security in the Computer Age
    A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  6. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  7. Cybercrime Investigators Handbook
    Cybercrime Investigators Handbook Graeme Edwards
  8. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  9. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
    Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  10. Future Minds: The Rise of Intelligence, from the Big Bang to the End of the Universe
    Future Minds: The Rise of Intelligence, from the Big Bang to the End of the Universe Richard Yonck
  11. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  12. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  13. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
    The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  14. Liars and Outliers: Enabling the Trust that Society Needs to Thrive
    Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
  15. Deep Learning
    Deep Learning John D. Kelleher
  16. Social Engineering: The Science of Human Hacking 2nd Edition
    Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  17. What is the Dark Web?: The truth about the hidden part of the internet
    What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  18. Schneier on Security
    Schneier on Security Bruce Schneier
  19. Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced
    Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced Maurice J. Thompson
  20. Cyber Privacy: Who Has Your Data and Why You Should Care
    Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  21. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  22. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  23. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  24. Coders at Work: Reflections on the Craft of Programming
    Coders at Work: Reflections on the Craft of Programming Peter Seibel
  25. Cybercrime and the Darknet: Revealing the hidden underworld of the internet
    Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  26. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
    The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  27. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  28. Programming Interviews For Dummies
    Programming Interviews For Dummies Eric Butow
  29. Profit over Privacy: How Surveillance Advertising Conquered the Internet
    Profit over Privacy: How Surveillance Advertising Conquered the Internet Matthew Crain
  30. Radical Technologies: The Design of Everyday Life
    Radical Technologies: The Design of Everyday Life Adam Greenfield
  31. Robot-Proof: Higher Education in the Age of Artificial Intelligence
    Robot-Proof: Higher Education in the Age of Artificial Intelligence Joseph E. Aoun
  32. Fight Like a Physicist: The Incredible Science Behind Martial Arts
    Fight Like a Physicist: The Incredible Science Behind Martial Arts Jason Thalken, PhD
  33. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
    Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  34. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  35. Artificial Intelligence: Modern Magic or Dangerous Future?
    Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
  36. Facing Violence: Preparing for the Unexpected
    Facing Violence: Preparing for the Unexpected Rory Miller
  37. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  38. Cloud Computing
    Cloud Computing Nayan B. Ruparella
  39. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  40. When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet
    When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet Handel Jones
  41. Can I See your Hands: A Guide To Situational Awareness, Personal Risk Management, Resilience and Security
    Can I See your Hands: A Guide To Situational Awareness, Personal Risk Management, Resilience and Security Dr. Gav Schneider
  42. Averting Catastrophe: Decision Theory for COVID-19, Climate Change, and Potential Disasters of All Kinds
    Averting Catastrophe: Decision Theory for COVID-19, Climate Change, and Potential Disasters of All Kinds Cass R. Sunstein
  43. The Body Builders: Inside the Science of the Engineered Human
    The Body Builders: Inside the Science of the Engineered Human Adam Piore
  44. CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON
    CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON MARK MATTHES AND ERIC LUTZ
  45. Straight Talk on Trade: Ideas for a Sane World Economy
    Straight Talk on Trade: Ideas for a Sane World Economy Dani Rodrik

Därför kommer du älska Storytel:

  • 1 miljon stories

  • Lyssna och läs offline

  • Exklusiva nyheter varje vecka

  • Kids Mode (barnsäker miljö)

Populäraste valet

Premium

Lyssna och läs ofta.

169 kr /månad
  • 1 konto

  • 100 timmar/månad

  • Exklusivt innehåll varje vecka

  • Avsluta när du vill

  • Obegränsad lyssning på podcasts

Starta erbjudandet

Unlimited

Lyssna och läs obegränsat.

229 kr /månad
  • 1 konto

  • Lyssna obegränsat

  • Exklusivt innehåll varje vecka

  • Avsluta när du vill

  • Obegränsad lyssning på podcasts

Starta erbjudandet

Family

Dela stories med hela familjen.

0 kr i 30 dagar
  • 2-6 konton

  • 100 timmar/månad för varje konto

  • Exklusivt innehåll varje vecka

  • Avsluta när du vill

  • Obegränsad lyssning på podcasts

2 konton

239 kr /månad
Starta erbjudandet

Flex

Lyssna och läs ibland – spara dina olyssnade timmar.

99 kr /månad
  • 1 konto

  • 20 timmar/månad

  • Spara upp till 100 olyssnade timmar

  • Exklusivt innehåll varje vecka

  • Avsluta när du vill

  • Obegränsad lyssning på podcasts

Starta erbjudandet