Dinle ya da oku

Sesli kitapların büyülü dünyasına adım at.

  • İlk 2 ay ₺124,99/ay
  • Binlerce sesli kitap ve e-kitap.
  • Dilediğin kadar dinle ya da oku.
  • Çevrimdışı modu.
  • İstediğin zaman iptal et.
Abonelik başlat
TR - Details page - Device banner - 894x1036

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals

11 Puan

3.6

Süre
10sa 34dk
Dil
İngilizce
Format
Kategori

Kurgu Dışı

The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret.

In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person, so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn. With those habits and his careful debunking of common cybersecurity myths you'll be able to protect yourself and your family from:

● Identify theft

● Compromising your children

● Lost money

● Lost access to email and social media accounts

© 2019 Ascent Audio (Sesli Kitap): 9781469071497

Yayın tarihi

Sesli Kitap: 19 Şubat 2019

Etiketler

    Bunları da beğenebilirsin...

    1. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    2. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    3. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    4. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    5. Cybersecurity For Dummies Joseph Steinberg
    6. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    7. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    8. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
    9. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
    10. Cybercrime Investigators Handbook Graeme Edwards
    11. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    12. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    13. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    14. Cyberdeterrence and Cyberwar Martin C. Libicki
    15. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    16. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    17. Blockchain For Dummies Tiana Laurence
    18. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    19. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
    20. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    21. Biggest Cyber Crimes in the History Introbooks Team
    22. How Smart Machines Think Sean Gerrish
    23. Artificial Intelligence For Dummies Luca Massaron
    24. Data Science For Dummies: 2nd Edition Lillian Pierson
    25. Cyber Security for Decision Makers Jarno Limnéll
    26. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    27. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
    28. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    29. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
    30. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart

    Storytel dünyasını keşfet:

    • Kids mode

    • Çevrimdışı modu

    • İstediğin zaman iptal et

    • Her yerde erişim

    Sınırsız

    Sınırsızca dinlemek ve okumak isteyenler için.

    ₺249.99 /ay
    • 1 hesap

    • Sınırsız erişim

    • İstediğin zaman iptal et

    Abonelik başlat

    Sınırsız Yıllık

    Sınırsızca dinlemek ve okumak isteyenler için.

    ₺1499.99 /yıl
    6 ay öde, 12 ay dinle
    • 1 hesap

    • Sınırsız erişim

    • İstediğin zaman iptal et

    Abonelik başlat

    Aile (2 hesap)

    Hikayeleri sevdikleri ile paylaşmak isteyenler için.

    ₺379.99 /ay
    • 2 hesap

    • Sınırsız erişim

    • İstediğin zaman iptal et

    Abonelik başlat

    Aile (3 hesap)

    Hikayeleri sevdikleri ile paylaşmak isteyenler için.

    ₺474.99 /ay
    • 3 hesap

    • Sınırsız erişim

    • İstediğin zaman iptal et

    Abonelik başlat