The Secrets Behind Cyber Attacks
De som köpt den här boken har ofta också köpt Autocracy, Inc av Anne Applebaum (inbunden).
Köp båda 2 för 398 krThe world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career. Confident C...
"A must-read. It offers a fresh perspective on cybersecurity, emphasizing the human element and making it invaluable for anyone interested in safeguarding their digital presence." * Melecia McLean, Security Behaviour and Culture Lead, TikTok * "Hacked is like a dictionary of manageable cyber risk. As always, Barker's writing is warm and accessible, and contains an abundance of common sense solutions." * Ciaran Martin, Professor, University of Oxford and former head of UK National Cyber Security Centre * "Does a great job of demystifying cybersecurity. Read this book, and then pass it on to a loved one. We need to protect ourselves and each other." * Lisa Plaggemier, Executive Director, National Cyber Security Alliance * "Crafted by a cybersecurity visionary, this essential guide tackles the spectrum of cyber threats. It provides actionable strategies and expert insights into safeguarding digital lives against sophisticated scams and vulnerabilities." * Surinder Lall, SVP Information Security Risk Management, Paramount *
Jessica Barker is the co-founder and co-CEO of Cygenta, a leading consultancy which advices businesses such as Mastercard, Microsoft and Cisco on their cybersecurity and cyber risk. She is also a prominent thought leader on the topics of cybersecurity and cybercrime and was named as the 'Cyber Citizen of the Year 2022' by the National Cyber Awards. She is the author of Confident Cyber Security (also published by Kogan Page). She is based in Las Vegas.
Chapter - 00: Introduction: the groups behind cyber attacks; Chapter - 01: Phishing; Chapter - 02: Account compromise; Chapter - 03: Vulnerabilities and exploits; Chapter - 04: Romance fraud; Chapter - 05: Cyber fraud; Chapter - 06: Identity fraud; Chapter - 07: Social media scams; Chapter - 08: Malicious insiders; Chapter - 09: Malware; Chapter - 10: Ransomware; Chapter - 11: The internet of things; Chapter - 12: Cryptocurrency crime; Chapter - 13: Artificial intelligence; Chapter - 14: Conclusion: staying safe from cyber attacks;