ฟังและอ่าน

ก้าวเข้าสู่โลกแห่งเรื่องราวอันไม่มีที่สิ้นสุด

  • อ่านและฟังได้มากเท่าที่คุณต้องการ
  • มากกว่า 1 ล้านชื่อ
  • Storytel Originals ผลงานเฉพาะบน Storytel
  • 199บ./ด.
  • ยกเลิกได้ทุกเมื่อ
เริ่ม
Details page - Device banner - 894x1036
Cover for Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond

Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond

23 คะแนน

3.7

ระยะเวลา
3 ชม. 12 น.
ภาษา
ภาษาอังกฤษ
รูปแบบ
คอลเลกชัน

นอนฟิกชั่น

Want to Keep Your Devices and Networks Safe from Cyberattacks with Just a Few Easy Steps? Read on. Technology can seem like a blessing or a curse. Cyber attacks are a growing problem that’s affecting an increasing number of devices and people.

The current numbers are staggering. Hackers create and deploy over 300 000 new malware programs every single day on networks, individual computers, and other devices. And there are nearly half a million ransomware attacks every year.

Cyber Security educates you on these threats and clearly walks you through the steps to prevent, detect, and respond to these attacks.

In Cyber Security, you 'll discover:

How vulnerable you are right now • and how to protect yourself within less than 24h • A simple, straight-forward security framework • for preventing, detecting, and responding to attacks • The most damaging but hard to detect attacks and what to do about it • Which unexpected device could be attacked and have life-threatening • consequences • Different types of malware and how to handle each effectively • Specific protection actions used by the FBI and CIA that you can take too • Security dangers of popular social media networks • , unknown to most users, but regularly exploited by hackers

And much more.

A lot of people resist securing their technology because it can be overwhelming. It’s not clear where to start and any instructions you do find can be confusing, frustrating, and time-consuming. The key is to keep it simple and manageable with your first foray into security.

If you want to protect your devices and networks from cyberattacks, then click the “Add to Cart” button right now.

© 2020 Matt Reyes (หนังสือเสียง): 9781987194401

วันเปิดตัว

หนังสือเสียง: 11 มีนาคม 2563

แท็ก

    คนอื่นก็สนุก...

    1. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
      The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    2. Cybersecurity For Dummies
      Cybersecurity For Dummies Joseph Steinberg
    3. What is the Dark Web?: The truth about the hidden part of the internet
      What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
    4. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
      Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    5. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
      Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    6. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
      Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    7. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
      Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    8. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    9. Cybercrime Investigators Handbook
      Cybercrime Investigators Handbook Graeme Edwards
    10. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
      A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    11. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
      Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
    12. New Laws of Robotics: Defending Human Expertise in the Age of AI
      New Laws of Robotics: Defending Human Expertise in the Age of AI Frank Pasquale
    13. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
      The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
    14. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
      Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
    15. Deep Learning
      Deep Learning John D. Kelleher
    16. The Age of AI: Artificial Intelligence and the Future of Humanity
      The Age of AI: Artificial Intelligence and the Future of Humanity Jason Thacker
    17. 3D Printing
      3D Printing John M. Jordan
    18. Data Science For Dummies: 2nd Edition
      Data Science For Dummies: 2nd Edition Lillian Pierson
    19. Cyber Hacking: Wars in Virtual Space
      Cyber Hacking: Wars in Virtual Space Scientific American
    20. The Digital Silk Road: China's Quest to Wire the World and Win the Future
      The Digital Silk Road: China's Quest to Wire the World and Win the Future Jonathan E. Hillman
    21. Virtual Reality
      Virtual Reality Samuel Greengard
    22. Basics of Statistics Explained
      Basics of Statistics Explained Introbooks Team
    23. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    24. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
      The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    25. The Vanishing American Corporation: Navigating the Hazards of a New Economy
      The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
    26. Ten Short Lessons in Artificial Intelligence and Robotics
      Ten Short Lessons in Artificial Intelligence and Robotics Peter J. Bentley
    27. Software Development Fundamentals
      Software Development Fundamentals Introbooks Team
    28. The Illusion of Control: Why Financial Crises Happen, and What We Can (and Can't) Do About It
      The Illusion of Control: Why Financial Crises Happen, and What We Can (and Can't) Do About It Jon Danielsson
    29. The Legal Analyst: A Toolkit for Thinking about the Law
      The Legal Analyst: A Toolkit for Thinking about the Law Ward Farnsworth
    30. Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI
      Trustworthy AI: A Business Guide for Navigating Trust and Ethics in AI Beena Ammanath
    31. Social Engineering: The Science of Human Hacking 2nd Edition
      Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    32. Artificial Intelligence: Modern Magic or Dangerous Future?
      Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
    33. The Metaverse Handbook: Innovating for the Internet's Next Tectonic Shift
      The Metaverse Handbook: Innovating for the Internet's Next Tectonic Shift QuHarrison Terry
    34. The New Roaring Twenties: Prosper in Volatile Times
      The New Roaring Twenties: Prosper in Volatile Times Paul Zane Pilzer
    35. Data For the People: How to Make Our Post-Privacy Economy Work for You
      Data For the People: How to Make Our Post-Privacy Economy Work for You Andreas S. Weigend
    36. How Money Became Dangerous: The Inside Story of our Turbulent Relationship with Modern Finance
      How Money Became Dangerous: The Inside Story of our Turbulent Relationship with Modern Finance Christopher Varelas
    37. Blockchain For Dummies
      Blockchain For Dummies Tiana Laurence
    38. Strategy Masters: The Prince, The Art of War, and The Gallic Wars
      Strategy Masters: The Prince, The Art of War, and The Gallic Wars Julius Caesar
    39. Hacking: How to Hack
      Hacking: How to Hack Alex Wagner
    40. The Money Illusion: Market Monetarism, the Great Recession, and the Future of Monetary Policy
      The Money Illusion: Market Monetarism, the Great Recession, and the Future of Monetary Policy Scott Sumner
    41. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
      (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
    42. Statistics Crash Course
      Statistics Crash Course Introbooks Team
    43. Practical Statistics
      Practical Statistics Introbooks Team
    44. Deep Learning: Guide to Machine Learning and Artificial Intelligence
      Deep Learning: Guide to Machine Learning and Artificial Intelligence David Feldspar
    45. We Have Root: Even More Advice from Schneier on Security
      We Have Root: Even More Advice from Schneier on Security Bruce Schneier
    46. The Billion Dollar Molecule: One Company's Quest for the Perfect Drug
      The Billion Dollar Molecule: One Company's Quest for the Perfect Drug Barry Werth
    47. Machine Learning
      Machine Learning Introbooks Team
    48. CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON
      CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON MARK MATTHES AND ERIC LUTZ
    49. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
      The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
    50. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    51. Genentech: The Beginnings of Biotech
      Genentech: The Beginnings of Biotech Sally Smith Hughes
    52. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
      Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
    53. Artificial Intelligence For Dummies
      Artificial Intelligence For Dummies Luca Massaron
    54. Recycling
      Recycling Finn Arne Jorgensen
    55. Ludicrous: The Unvarnished Story of Tesla Motors
      Ludicrous: The Unvarnished Story of Tesla Motors Edward Niedermeyer
    56. Military Strategies and Tactics
      Military Strategies and Tactics Introbooks Team
    57. The Einstein Syndrome: Bright Children Who Talk Late
      The Einstein Syndrome: Bright Children Who Talk Late Thomas Sowell
    58. Human Work in the Age of Smart Machines
      Human Work in the Age of Smart Machines Jamie Merisotis
    59. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    60. fMRI
      fMRI Peter A. Bandettini
    61. Leadership Moments from NASA: Achieving the Impossible
      Leadership Moments from NASA: Achieving the Impossible Dr. Dave Williams
    62. Liars: Falsehoods and Free Speech in an Age of Deception: Falsehoods and Free Speech in an Age of Deception
      Liars: Falsehoods and Free Speech in an Age of Deception: Falsehoods and Free Speech in an Age of Deception Cass R. Sunstein
    63. Accountable: The Rise of Citizen Capitalism
      Accountable: The Rise of Citizen Capitalism Michael O'Leary
    64. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    65. The Man Who Sold America: The Amazing but True Story of Albert D. Lasker and the Creation of the Advertising Century
      The Man Who Sold America: The Amazing but True Story of Albert D. Lasker and the Creation of the Advertising Century Arthur W. Schultz
    66. Computer Science
      Computer Science Introbooks Team
    67. Why You Won't Get Rich: How Capitalism Broke its Contract with Hard Work
      Why You Won't Get Rich: How Capitalism Broke its Contract with Hard Work Robert Verkaik
    68. Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy
      Thinking Like an Economist: How Efficiency Replaced Equality in U.S. Public Policy Elizabeth Popp Berman
    69. How Charts Lie: Getting Smarter about Visual Information
      How Charts Lie: Getting Smarter about Visual Information Alberto Cairo
    70. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
      The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
    71. Better Business: How the B Corp Movement Is Remaking Capitalism
      Better Business: How the B Corp Movement Is Remaking Capitalism Christopher Marquis
    72. Social Capital: Life online in the shadow of Ireland’s tech boom
      Social Capital: Life online in the shadow of Ireland’s tech boom Aoife Barry
    73. The Spanx Story: What's Underneath the Incredible success of Sara Blakely's Billion Dollar Empire
      The Spanx Story: What's Underneath the Incredible success of Sara Blakely's Billion Dollar Empire Charlie Wetzel
    74. Thinking Like a Lawyer: A Framework for Teaching Critical Thinking to All Students
      Thinking Like a Lawyer: A Framework for Teaching Critical Thinking to All Students Colin Seale
    75. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
      Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    76. All You Can Pay: How Companies Use Our Data to Empty Our Wallets
      All You Can Pay: How Companies Use Our Data to Empty Our Wallets Anna Bernasek
    77. The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace
      The Money Makers: How Roosevelt and Keynes Ended the Depression, Defeated Fascism, and Secured a Prosperous Peace Eric Rauchway
    78. Running a Restaurant For Dummies
      Running a Restaurant For Dummies Heather Dismore
    79. Life After Capitalism: The Meaning of Wealth, the Future of the Economy, and the Time Theory of Money
      Life After Capitalism: The Meaning of Wealth, the Future of the Economy, and the Time Theory of Money George Gilder

    ทุกที่ ทุกเวลากับ Storytel:

    • กว่า 500 000 รายการ

    • Kids Mode (เนื้อหาที่ปลอดภัยสำหรับเด็ก)

    • ดาวน์โหลดหนังสือสำหรับการเข้าถึงแบบออฟไลน์

    • ยกเลิกได้ตลอดเวลา

    ที่นิยมมากที่สุด

    Unlimited

    สำหรับผู้ที่ต้องการฟังและอ่านอย่างไม่จำกัด

    199 บ. /เดือน
    • 1 บัญชี

    • การเข้าถึงแบบไม่ จำกัด

    • 1 บัญชี

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม

    Family

    สำหรับผู้ที่ต้องการแบ่งปันเรื่องราวกับครอบครัวและเพื่อน

    349 บ. /เดือน
    • 3 บัญชี

    • การเข้าถึงแบบไม่ จำกัด

    • ฟังได้ไม่จำกัด

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม