Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

19 Bedømmelse

3.2

Varighed
10T 46M
Sprog
Engelsk
Format
Kategori

Fakta

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

● Go deep into the world of white hat hacking to grasp just how critical cybersecurity is

● Read the stories of some of the world's most renowned computer security experts

● Delve into social engineering, cryptography, penetration testing, network attacks, and more

As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

© 2019 Tantor Media (Lydbog): 9781515949848

Udgivelsesdato

Lydbog: 8. oktober 2019

Tags

    Andre kan også lide...

    1. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
      The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    2. Cyber Hacking: Wars in Virtual Space
      Cyber Hacking: Wars in Virtual Space Scientific American
    3. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
      Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    4. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
      Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    5. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
      A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    6. A Vulnerable System: The History of Information Security in the Computer Age
      A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    7. Karate Science: Dynamic Movement
      Karate Science: Dynamic Movement J. D. Swanson
    8. Cybersecurity For Dummies
      Cybersecurity For Dummies Joseph Steinberg
    9. Artificial Intelligence: Modern Magic or Dangerous Future?
      Artificial Intelligence: Modern Magic or Dangerous Future? Yorick Wilks
    10. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
      Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    11. What is the Dark Web?: The truth about the hidden part of the internet
      What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
    12. The Future of Energy
      The Future of Energy Scientific American
    13. Future Minds: The Rise of Intelligence, from the Big Bang to the End of the Universe
      Future Minds: The Rise of Intelligence, from the Big Bang to the End of the Universe Richard Yonck
    14. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
      The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    15. Deep Learning
      Deep Learning John D. Kelleher
    16. Auctions
      Auctions Timothy P. Hubbard
    17. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
      Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    18. The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans
      The Things We Make: The Unknown History of Invention from Cathedrals to Soda Cans Bill Hammack
    19. Outside the Box: How Globaliszation Changed from Moving Stuff to Spreading Ideas: How Globalization Changed from Moving Stuff to Spreading Ideas
      Outside the Box: How Globaliszation Changed from Moving Stuff to Spreading Ideas: How Globalization Changed from Moving Stuff to Spreading Ideas Marc Levinson
    20. Robot-Proof: Higher Education in the Age of Artificial Intelligence
      Robot-Proof: Higher Education in the Age of Artificial Intelligence Joseph E. Aoun
    21. When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet
      When AI Rules the World: China, the U.S., and the Race to Control a Smart Planet Handel Jones
    22. Extraterrestrials
      Extraterrestrials Wade Roush
    23. The Body Builders: Inside the Science of the Engineered Human
      The Body Builders: Inside the Science of the Engineered Human Adam Piore
    24. Cryptography: The Key to Digital Security, How It Works, and Why It Matters
      Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    25. What the Luck?: The Surprising Role of Chance in Our Everyday Lives
      What the Luck?: The Surprising Role of Chance in Our Everyday Lives Gary Smith
    26. CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON
      CODING FOR BEGINNERS USING PYTHON: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON MARK MATTHES AND ERIC LUTZ
    27. Facing Violence: Preparing for the Unexpected
      Facing Violence: Preparing for the Unexpected Rory Miller
    28. Averting Catastrophe: Decision Theory for COVID-19, Climate Change, and Potential Disasters of All Kinds
      Averting Catastrophe: Decision Theory for COVID-19, Climate Change, and Potential Disasters of All Kinds Cass R. Sunstein
    29. Cyber Privacy: Who Has Your Data and Why You Should Care
      Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    30. Cybercrime Investigators Handbook
      Cybercrime Investigators Handbook Graeme Edwards
    31. Martin Gardner: The Magic and Mystery of Numbers
      Martin Gardner: The Magic and Mystery of Numbers Scientific American
    32. Liars and Outliers: Enabling the Trust that Society Needs to Thrive
      Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
    33. Straight Talk on Trade: Ideas for a Sane World Economy
      Straight Talk on Trade: Ideas for a Sane World Economy Dani Rodrik
    34. AI and Genius Machines
      AI and Genius Machines Scientific American
    35. Can I See your Hands: A Guide To Situational Awareness, Personal Risk Management, Resilience and Security
      Can I See your Hands: A Guide To Situational Awareness, Personal Risk Management, Resilience and Security Dr. Gav Schneider
    36. The Case Against Socialism
      The Case Against Socialism Rand Paul
    37. Measurement
      Measurement Paul Lockhart
    38. Endgame: Bobby Fischer’s Remarkable Rise and Fall—from America’s Brightest Prodigy to the Edge of Madness
      Endgame: Bobby Fischer’s Remarkable Rise and Fall—from America’s Brightest Prodigy to the Edge of Madness Frank Brady
    39. Fraud: An American History from Barnum to Madoff
      Fraud: An American History from Barnum to Madoff Edward J. Balleisen
    40. Designing the Urban Future: Smart Cities
      Designing the Urban Future: Smart Cities Scientific American
    41. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World
      The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
    42. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
      The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
    43. Big Data: How the Information Revolution Is Transforming Our Lives
      Big Data: How the Information Revolution Is Transforming Our Lives Brian Clegg
    44. Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced
      Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced Maurice J. Thompson
    45. Of Privacy and Power: The Transatlantic Struggle over Freedom and Security
      Of Privacy and Power: The Transatlantic Struggle over Freedom and Security Henry Farrell
    46. Climate Change and Extreme Weather
      Climate Change and Extreme Weather Scientific American
    47. Cogs and Monsters: What Economics Is, and What It Should Be
      Cogs and Monsters: What Economics Is, and What It Should Be Diane Coyle
    48. Social Engineering: The Science of Human Hacking 2nd Edition
      Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    49. Protocol: The Power of Diplomacy and How to Make It Work for You
      Protocol: The Power of Diplomacy and How to Make It Work for You Capricia Penavic Marshall
    50. The Ethics of Influence: Government in the Age of Behavioral Science
      The Ethics of Influence: Government in the Age of Behavioral Science Cass R. Sunstein
    51. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
      Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    52. Machine Learning: Deep Learning, Text Analytics, and Reinforcement Learning with Big Data
      Machine Learning: Deep Learning, Text Analytics, and Reinforcement Learning with Big Data David Feldspar
    53. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
      Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
    54. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
      Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    55. The New Roaring Twenties: Prosper in Volatile Times
      The New Roaring Twenties: Prosper in Volatile Times Paul Zane Pilzer
    56. System Error: Where Big Tech Went Wrong and How We Can Reboot
      System Error: Where Big Tech Went Wrong and How We Can Reboot Rob Reich
    57. Borrowed Time: Two Centuries of Booms, Busts, and Bailouts at Citi
      Borrowed Time: Two Centuries of Booms, Busts, and Bailouts at Citi James Freeman
    58. Make It New: The History of Silicon Valley Design
      Make It New: The History of Silicon Valley Design Barry Katz
    59. 50 Quantum Physics Questions In Plain Simple English: Simple And Easy Answers Without Math For Beginners
      50 Quantum Physics Questions In Plain Simple English: Simple And Easy Answers Without Math For Beginners Donald B. Grey
    60. 3D Printing
      3D Printing John M. Jordan
    61. Sensible Politics: Visualizing International Relations
      Sensible Politics: Visualizing International Relations William A. Callahan
    62. Seven Crashes: The Economic Crises That Shaped Globalization
      Seven Crashes: The Economic Crises That Shaped Globalization Harold James
    63. Radical Technologies: The Design of Everyday Life
      Radical Technologies: The Design of Everyday Life Adam Greenfield
    64. Inventor of the Future: The Visionary Life of Buckminster Fuller
      Inventor of the Future: The Visionary Life of Buckminster Fuller Alec Nevala-Lee
    65. An Introduction to Information Theory: Symbols, Signals and Noise
      An Introduction to Information Theory: Symbols, Signals and Noise John R. Pierce
    66. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    67. The Biggest Number in the World: A Journey to the Edge of Mathematics
      The Biggest Number in the World: A Journey to the Edge of Mathematics David Darling
    68. Ask the Experts: Physics and Math
      Ask the Experts: Physics and Math Scientific American
    69. When the Heavens Went on Sale: The Misfits and Geniuses Racing to Put Space Within Reach
      When the Heavens Went on Sale: The Misfits and Geniuses Racing to Put Space Within Reach Ashlee Vance
    70. How It All Ends
      How It All Ends Scientific American
    71. Superpower Showdown: How the Battle between Trump and Xi Threatens a New Cold War
      Superpower Showdown: How the Battle between Trump and Xi Threatens a New Cold War Bob Davis
    72. Law and Leviathan: Redeeming the Administrative State
      Law and Leviathan: Redeeming the Administrative State Adrian Vermeule
    73. Inflation: What It Is, Why It's Bad, and How to Fix It
      Inflation: What It Is, Why It's Bad, and How to Fix It Steve Forbes
    74. The Future of Humankind: Why We Should be Optimistic
      The Future of Humankind: Why We Should be Optimistic John Hands
    75. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
      Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
    76. 2084 and the AI Revolution, Updated and Expanded Edition: How Artificial Intelligence Informs Our Future
      2084 and the AI Revolution, Updated and Expanded Edition: How Artificial Intelligence Informs Our Future John C. Lennox
    77. The Enlightened Capitalists: Cautionary Tales of Business Pioneers Who Tried to Do Well by Doing Good
      The Enlightened Capitalists: Cautionary Tales of Business Pioneers Who Tried to Do Well by Doing Good James O'Toole
    78. How to Survive: Lessons for Everyday Life from the Extreme World
      How to Survive: Lessons for Everyday Life from the Extreme World John Hudson
    79. Profit over Privacy: How Surveillance Advertising Conquered the Internet
      Profit over Privacy: How Surveillance Advertising Conquered the Internet Matthew Crain
    80. Zero: The Biography of a Dangerous Idea
      Zero: The Biography of a Dangerous Idea Charles Seife
    81. Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity
      Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity Robert Hannigan
    82. The Clock Mirage: Our Myth of Measured Time
      The Clock Mirage: Our Myth of Measured Time Joseph Mazur
    83. Coders at Work: Reflections on the Craft of Programming
      Coders at Work: Reflections on the Craft of Programming Peter Seibel
    84. China: The Bubble That Never Pops
      China: The Bubble That Never Pops Thomas Orlik
    85. The Science behind the Debates
      The Science behind the Debates Scientific American
    86. Arriving Today: From Factory to Front Door: Why Everything Has Changed About How and What We Buy
      Arriving Today: From Factory to Front Door: Why Everything Has Changed About How and What We Buy Christopher Mims
    87. The Delusions Of Crowds: Why People Go Mad in Groups
      The Delusions Of Crowds: Why People Go Mad in Groups William J. Bernstein
    88. Game Theory: Understanding the Mathematics of Life
      Game Theory: Understanding the Mathematics of Life Brian Clegg
    89. Capitalist Punishment: How Wall Street Is Using Your Money to Create a Country You Didn't Vote For
      Capitalist Punishment: How Wall Street Is Using Your Money to Create a Country You Didn't Vote For Vivek Ramaswamy

    Vælg dit abonnement

    • Over 600.000 titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned
    • 1 konto

    • 100 timer/måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Unlimited

    For dig som lytter og læser ubegrænset.

    159 kr. /måned
    • 1 konto

    • Ubegrænset adgang

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned
    • 2-6 konti

    • 100 timer/måned pr. konto

    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    2 konti

    179 kr. /måned
    Start tilbuddet

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned
    • 1 konto

    • 20 timer/måned

    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis