Page de couverture de Taming the Hacking Storm

Taming the Hacking Storm

A Framework for Defeating Hackers and Malware

Aperçu

30 jours d'essai gratuit à Audible Standard

Essayez l’abonnement standard gratuitement
Choisissez 1 livre audio par mois dans notre collection contenant plus de 900 000 titres.
Écoutez les livres audio que vous avez sélectionnés tant que vous êtes membre.
Profitez d’un accès illimité à des balados incontournables.
L'abonnement Standard se renouvelle automatiquement au tarif de 8,99 $/mois + taxes applicables après 30 jours. Annulation possible à tout moment.

Taming the Hacking Storm

Auteur(s): Roger A. Grimes
Narrateur(s): Mike Lenz
Essayez l’abonnement standard gratuitement

8,99 $/mois après 30 jours. Annulable en tout temps

Acheter pour 24,97 $

Acheter pour 24,97 $

À propos de cet audio

Taming the Hacking Storm is a groundbreaking new roadmap to solving the Internet security issues currently plaguing countries, businesses, and individuals around the world. In easy-to-understand and non-technical language, cybersecurity veteran Roger Grimes describes the most prevalent threats to our online safety today and what ties them all together. He goes on to lay out a comprehensive and robust framework for combating that threat―one that rests on a foundation of identity verification―and explains exactly how to implement it in the real world.

The author addresses each of the challenges, pitfalls, and roadblocks that might stand in the way of his solutions, offering practical ways to navigate, avoid, or counter those impediments. The book also includes advice on how to address peripheral security issues, including software and firmware vulnerabilities; strategies for addressing a lack of international agreement on the implementation of security standards and practices; and things you can do today to encourage the development of a more secure, trusted Internet.

An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2025 Wiley (P)2025 Ascent Audio
Sécurité et chiffrement Sécurité informatique Technologie Piratage Logiciel Cybersécurité Programmation
Pas encore de commentaire