
Cybersecurity Myths and Misconceptions
Avoiding the Hazards and Pitfalls that Derail Us
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $24.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Rich Boniface
Acerca de esta escucha
175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them
Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link?
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses.
- Hear over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them.
- Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't "best practices" best?
- Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader.
- Get a high-level exposure to why statistics and figures may mislead as well as enlighten.
- Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them.
"You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. . . . Read the book, laugh at the right places, and put your learning to work. You won't regret it."
--From the Foreword by Vint Cerf, Internet Hall of Fame Pioneer
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
©2023 Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra (P)2024 Eugene H. Spafford, Leigh Metcalf, Josiah DykstraLos oyentes también disfrutaron...
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- De: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrado por: Tom Parks
- Duración: 65 h y 38 m
- Versión completa
-
General
-
Narración:
-
Historia
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.
-
-
Passed the CISSP exam
- De Ollie en 12-30-23
De: Mike Chapple, y otros
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- De Roman en 11-17-24
De: Rick Howard
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
Battlefield Cyber
- How China and Russia Are Undermining Our Democracy and National Security
- De: Michael G. McLaughlin, William Holstein
- Narrado por: Steve Menasche
- Duración: 11 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media—and our democracy—to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response.
-
-
Lack case studies on Russian threats and attacks.
- De MommyCEO en 03-14-24
De: Michael G. McLaughlin, y otros
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- De: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrado por: Tom Parks
- Duración: 65 h y 38 m
- Versión completa
-
General
-
Narración:
-
Historia
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.
-
-
Passed the CISSP exam
- De Ollie en 12-30-23
De: Mike Chapple, y otros
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- De Roman en 11-17-24
De: Rick Howard
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
Battlefield Cyber
- How China and Russia Are Undermining Our Democracy and National Security
- De: Michael G. McLaughlin, William Holstein
- Narrado por: Steve Menasche
- Duración: 11 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media—and our democracy—to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response.
-
-
Lack case studies on Russian threats and attacks.
- De MommyCEO en 03-14-24
De: Michael G. McLaughlin, y otros
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- De: Geoff White
- Narrado por: Geoff White
- Duración: 8 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
Propagandistic tone
- De Philippe Delteil en 04-17-23
De: Geoff White
-
Firefly: Big Damn Hero
- Firefly, Book 1
- De: James Lovegrove
- Narrado por: James Anderson Foster
- Duración: 9 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
The Battle of Serenity Valley was the turning point that led the Independents to their defeat at the hands of the Alliance. Yet the Browncoats had held the valley for weeks against all odds, before being ordered to lay down their arms. Command stated they refused to send in airpower because the ground war was "too hot". But the soldiers who were there insist that was not true.... While picking up a new cargo on Persephone, Captain Malcolm Reynolds is kidnapped by a bunch of embittered veteran Browncoats who suspect him of sabotaging the Independents during the war.
-
-
Take me out to the black!
- De Adam en 12-06-19
De: James Lovegrove
-
Defensive Security Handbook (2nd Edition)
- Best Practices for Securing Infrastructure
- De: William F. Reyor III, Lee Brotherston, Amanda Berlin
- Narrado por: Teri Schnaubelt
- Duración: 12 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
De: William F. Reyor III, y otros
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- De: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrado por: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Duración: 12 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- De Silvershopper en 01-18-23
De: Laurent Richard, y otros
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- De: Renee Dudley, Daniel Golden
- Narrado por: BD Wong
- Duración: 11 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- De Rob Chavez en 01-18-23
De: Renee Dudley, y otros
Las personas que vieron esto también vieron...
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- De Roman en 11-17-24
De: Rick Howard
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- De: Joseph Cox
- Narrado por: Peter Ganim
- Duración: 11 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes--the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld.
-
-
Amazing story
- De Katie W. en 06-08-24
De: Joseph Cox
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- De: Douglas W. Hubbard, Richard Seiersen
- Narrado por: Jim Seybert
- Duración: 14 h y 5 m
- Versión completa
-
General
-
Narración:
-
Historia
In How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
De: Douglas W. Hubbard, y otros
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- De: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, y otros
- Narrado por: The Voice Gallery
- Duración: 8 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
-
-
A Must for Aspiring Cybersecurity Professionals
- De Chuck S en 02-12-23
De: Dr. Gerald Auger, y otros
-
Cybersecurity All-in-One for Dummies
- De: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, y otros
- Narrado por: Tom Perkins
- Duración: 24 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever.
-
-
Great book
- De KatieLynn en 10-08-24
De: Joseph Steinberg, y otros
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- De Roman en 11-17-24
De: Rick Howard
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- De: Joseph Cox
- Narrado por: Peter Ganim
- Duración: 11 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes--the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld.
-
-
Amazing story
- De Katie W. en 06-08-24
De: Joseph Cox
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- De: Douglas W. Hubbard, Richard Seiersen
- Narrado por: Jim Seybert
- Duración: 14 h y 5 m
- Versión completa
-
General
-
Narración:
-
Historia
In How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
De: Douglas W. Hubbard, y otros
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- De: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, y otros
- Narrado por: The Voice Gallery
- Duración: 8 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
-
-
A Must for Aspiring Cybersecurity Professionals
- De Chuck S en 02-12-23
De: Dr. Gerald Auger, y otros
-
Cybersecurity All-in-One for Dummies
- De: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, y otros
- Narrado por: Tom Perkins
- Duración: 24 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever.
-
-
Great book
- De KatieLynn en 10-08-24
De: Joseph Steinberg, y otros
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- De: Mike Chapple, James Michael Stewart, Darril Gibson
- Narrado por: Tom Parks
- Duración: 65 h y 38 m
- Versión completa
-
General
-
Narración:
-
Historia
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.
-
-
Passed the CISSP exam
- De Ollie en 12-30-23
De: Mike Chapple, y otros
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- De: L.D. Knowings
- Narrado por: Barry Fike
- Duración: 3 h y 39 m
- Versión completa
-
General
-
Narración:
-
Historia
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively. Did you know that over 60% of businesses have experienced a cybersecurity incident in the past year? In a world where digital threats are escalating, understanding and mastering penetration testing is no longer a choice but a necessity.
-
-
Comprehensive and Accessible Cybersecurity Guide
- De Robert Brown en 05-24-24
De: L.D. Knowings
-
Cybersecurity for Beginners
- De: Raef Meeuwisse
- Narrado por: Danny Eastman
- Duración: 7 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- De keith en 03-25-18
De: Raef Meeuwisse
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
CISSP All-in-One Exam Guide, Ninth Edition
- De: Fernando Maymi, Shon Harris
- Narrado por: Teri Schnaubelt
- Duración: 51 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed by the International Information Systems Security Certification Consortium (ISC)2®. CISSP All-in-One Exam Guide, Ninth Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations.
-
-
Comprehensive Knowledge
- De Anonymous User en 05-09-24
De: Fernando Maymi, y otros
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- De: Glenn Greenwald
- Narrado por: L. J. Ganser
- Duración: 9 h y 49 m
- Versión completa
-
General
-
Narración:
-
Historia
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- De Alfredo Ramirez en 11-22-14
De: Glenn Greenwald
-
The Cybersecurity Playbook
- How Every Leader and Employee Can Contribute to a Culture of Security
- De: Allison Cerra
- Narrado por: Chloe Cannon
- Duración: 4 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This audiobook provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization's security is only as strong as its weakest link, this audiobook offers specific strategies for employees at every level.
-
-
Not for cybersecurity pros, a bit forceful on others
- De Jason en 01-05-25
De: Allison Cerra
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- De: Renee Dudley, Daniel Golden
- Narrado por: BD Wong
- Duración: 11 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- De Rob Chavez en 01-18-23
De: Renee Dudley, y otros
-
Cybersecurity for Dummies
- De: Joseph Steinberg
- Narrado por: BJ Harrison
- Duración: 13 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- De Anonymous User en 07-09-21
De: Joseph Steinberg
Lo que los oyentes dicen sobre Cybersecurity Myths and Misconceptions
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Ken Bauer
- 01-07-25
Excellent content and delivery.
Spaf and his co-authors are extremely well qualified to deliver this content and do it in an great way.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña