Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition)

Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition)

1 Bedømmelse

5

Varighed
4T 41M
Sprog
Engelsk
Format
Kategori

Fakta

Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.

Inside Cyber Warfare features an exclusive deep dive into the wartime operations of an offensive cyber unit of Ukraine's Ministry of Defense as it works to defend the nation against Russian forces, particularly since the 2022 invasion:

● See what happened when a Ukrainian cyber and special operations team worked together to destroy a secret missile laboratory

● Explore the legal status of cyber warfare and civilian hackers

● Discover how a cyber team with little money and limited resources learned to create fire from the manipulation of code in automated systems

● Distinguish reality from fiction regarding AI safety and existential risk

● Learn new strategies for keeping you and your loved ones safe in an increasingly complex and insecure world

© 2025 Ascent Audio (Lydbog): 9781663753021

Udgivelsesdato

Lydbog: 29. april 2025

Tags

    Andre kan også lide...

    1. The Developer's Playbook for Large Language Model Security: Building Secure AI Applications
      The Developer's Playbook for Large Language Model Security: Building Secure AI Applications Steve Wilson
    2. Quantum Mechanics and Quantum Information Theory: Understanding the Fundamentals and Potential Applications of Quantum Mechanics and Quantum Information Theory
      Quantum Mechanics and Quantum Information Theory: Understanding the Fundamentals and Potential Applications of Quantum Mechanics and Quantum Information Theory Daniel Garfield
    3. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition
      (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Mike Chapple
    4. LLMs and Generative AI for Healthcare: The Next Frontier
      LLMs and Generative AI for Healthcare: The Next Frontier Manish Mathur
    5. The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable
      The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Michael Lopp
    6. AI-Assisted Programming: Better Planning, Coding, Testing, and Deployment
      AI-Assisted Programming: Better Planning, Coding, Testing, and Deployment Tom Taulli
    7. Computer Systems and Networking for Beginners: Advanced Strategies and Techniques in Computer Systems and Networking for Optimal Efficiency and Scalability
      Computer Systems and Networking for Beginners: Advanced Strategies and Techniques in Computer Systems and Networking for Optimal Efficiency and Scalability Saimon Carrie
    8. Cybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide
      Cybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Kevin Clark
    9. Mastering Complexity: A Comprehensive Guide to Big O Complexity and DSA Problem Solving
      Mastering Complexity: A Comprehensive Guide to Big O Complexity and DSA Problem Solving DSA Shots
    10. Continuous Deployment: Enable Faster Feedback, Safer Releases, and More Reliable Software
      Continuous Deployment: Enable Faster Feedback, Safer Releases, and More Reliable Software Valentina Servile
    11. What is Blockchain?
      What is Blockchain? John Hargrave
    12. Tech Giants: The Companies Shaping the Future
      Tech Giants: The Companies Shaping the Future Craig Dames
    13. Algorithms: Practical Guide to Learn Algorithms For Beginners
      Algorithms: Practical Guide to Learn Algorithms For Beginners Andy Vickler
    14. Agile Methodologies: A Comprehensive Guide to Agile Practices and Principles
      Agile Methodologies: A Comprehensive Guide to Agile Practices and Principles May Sherry
    15. Artificial General Intelligence: (The MIT Press Essential Knowledge series)
      Artificial General Intelligence: (The MIT Press Essential Knowledge series) Julian Togelius
    16. Designing Machine Learning Systems: An Iterative Process for Production-Ready Applications
      Designing Machine Learning Systems: An Iterative Process for Production-Ready Applications Chip Huyen
    17. Agile Data Scientist: Navigating the Data Landscape with Flexibility and Precision
      Agile Data Scientist: Navigating the Data Landscape with Flexibility and Precision Daniel Green
    18. Fundamentals of Software Architecture: A Modern Engineering Approach (2nd Edition)
      Fundamentals of Software Architecture: A Modern Engineering Approach (2nd Edition) Neal Ford
    19. Data Science on AWS: Unleashing the Power of Cloud Computing for Innovative Data Insights
      Data Science on AWS: Unleashing the Power of Cloud Computing for Innovative Data Insights Saimon Carrie
    20. Data Science and Big Data: Data Science and Big Data Analytics: Unlocking the Power of Information
      Data Science and Big Data: Data Science and Big Data Analytics: Unlocking the Power of Information Liam Morgan
    21. Zero Code Builder: The Practical Blueprint to Design, Build, and Launch Web Apps Without Code Using Visual Tools
      Zero Code Builder: The Practical Blueprint to Design, Build, and Launch Web Apps Without Code Using Visual Tools Aaron Hayes
    22. Big Brain Revolution: Artificial Intelligence – Spy or Saviour?
      Big Brain Revolution: Artificial Intelligence – Spy or Saviour? Dr Michelle Tempest
    23. Docker Unveiled: The Comprehensive Handbook to  Streamlined Development
      Docker Unveiled: The Comprehensive Handbook to Streamlined Development William Drake
    24. Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World
      Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World Kim Crawley
    25. Quick Start Kubernetes
      Quick Start Kubernetes Nigel Poulton
    26. Programming for Beginners: Coding Essentials
      Programming for Beginners: Coding Essentials Craig Dames
    27. Our Livable World: Creating the Clean Earth of Tomorrow
      Our Livable World: Creating the Clean Earth of Tomorrow Marc Schaus
    28. Game Design Essentials: A Beginner's Guide to Creating Engaging Games
      Game Design Essentials: A Beginner's Guide to Creating Engaging Games Virversity Online Courses
    29. Scrumban: Comprehensive Guide to Hybrid Agile Project Management
      Scrumban: Comprehensive Guide to Hybrid Agile Project Management James Henry
    30. The Future Internet: How the Metaverse, Web 3.0, and Blockchain Will Transform Business and Society
      The Future Internet: How the Metaverse, Web 3.0, and Blockchain Will Transform Business and Society Bernard Marr
    31. Navigating Docker: From Setup to Deployment: A Developer's Companion
      Navigating Docker: From Setup to Deployment: A Developer's Companion Ethan Calderwood
    32. Building AI-Powered Products: The Essential Guide to AI and GenAI Product Management
      Building AI-Powered Products: The Essential Guide to AI and GenAI Product Management Dr. Marily Nika
    33. Algorithms of Armageddon: The Impact of Artificial Intelligence on Future Wars
      Algorithms of Armageddon: The Impact of Artificial Intelligence on Future Wars George Galdorisi
    34. Hands-On Large Language Models: Language Understanding and Generation
      Hands-On Large Language Models: Language Understanding and Generation Jay Alammar
    35. The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
      The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Glen D. Singh
    36. Data-Driven Decisions: Mastering Business Data Science
      Data-Driven Decisions: Mastering Business Data Science Chuck Sherman
    37. Kanban: Accelerating Project Success with Agile Kanban Frameworks
      Kanban: Accelerating Project Success with Agile Kanban Frameworks James Stockwell
    38. The New Science of Momentum: How the Best Coaches and Leaders Build a Fire from a Single Spark
      The New Science of Momentum: How the Best Coaches and Leaders Build a Fire from a Single Spark Don Yaeger
    39. Natural language Processing: Discover Potential of Natural Language Processing and Artificial Intelligence
      Natural language Processing: Discover Potential of Natural Language Processing and Artificial Intelligence Daniel Garfield
    40. Designed to Fail: How Modern Economic Systems Evolved to Feed on Perpetual Crisis — And How We Can Save Ourselves from Our Own Destruction
      Designed to Fail: How Modern Economic Systems Evolved to Feed on Perpetual Crisis — And How We Can Save Ourselves from Our Own Destruction Manuel Alessandro Collazo
    41. The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World
      The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World L. Y. Pratt
    42. Workforce 4.0: How AI, the Home Office, and the Gig Economy Are Disrupting the Status Quo
      Workforce 4.0: How AI, the Home Office, and the Gig Economy Are Disrupting the Status Quo Gerard Szatvanyi
    43. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
      Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    44. Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity
      Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity Robert Hannigan
    45. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
      Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    46. Extreme Programming for Beginners: Embracing Agility, Quality, and Collaboration  in Software Development
      Extreme Programming for Beginners: Embracing Agility, Quality, and Collaboration in Software Development Daniel Green
    47. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
      The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    48. CompTIA A+ Certification Study Guide For 220-1101 Exam 2 Books In 1: Mobile Devices, Networking, Hardware, Virtualization, Cloud Computing And Troubleshooting
      CompTIA A+ Certification Study Guide For 220-1101 Exam 2 Books In 1: Mobile Devices, Networking, Hardware, Virtualization, Cloud Computing And Troubleshooting Richie Miller
    49. Ultimate Kali Linux Book, Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
      Ultimate Kali Linux Book, Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Gllen D. Singh
    50. Effective Machine Learning Teams: Best Practices for ML Practitioners
      Effective Machine Learning Teams: Best Practices for ML Practitioners David Colls
    51. Computer Programming and Cybersecurity for Beginners: All You Need to Know to Get Started with Python for Data Science, Excel and Ethical Hacking
      Computer Programming and Cybersecurity for Beginners: All You Need to Know to Get Started with Python for Data Science, Excel and Ethical Hacking Kevin Clark
    52. Building a Cyber Risk Management Program: Evolving Security for the Digital Age
      Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    53. Wreckonomics: Why It's Time to End the War on Everything
      Wreckonomics: Why It's Time to End the War on Everything Ruben Andersson
    54. Data Mesh Architecture: Achieving Excellence in Efficiency and Innovation
      Data Mesh Architecture: Achieving Excellence in Efficiency and Innovation Simon Winston
    55. AI at the Edge: Solving Real-World Problems with Embedded Machine Learning
      AI at the Edge: Solving Real-World Problems with Embedded Machine Learning Jenny Plunkett
    56. The Ai Revolution: Machines, Minds, and the Human Future
      The Ai Revolution: Machines, Minds, and the Human Future Mustafa Scales
    57. Reprogramming The American Dream: From Rural America to Silicon Valley—Making AI Serve Us All
      Reprogramming The American Dream: From Rural America to Silicon Valley—Making AI Serve Us All Greg Shaw
    58. Androids: The Team that Built the Android Operating System
      Androids: The Team that Built the Android Operating System Chet Haase
    59. The Anti-Catastrophe League: The pioneers and visionaries on a quest to save the world
      The Anti-Catastrophe League: The pioneers and visionaries on a quest to save the world Tom Ough
    60. Quantum Computing For Dummies
      Quantum Computing For Dummies whurley
    61. Generative AI on AWS: Building Context-Aware Multimodal Reasoning Applications
      Generative AI on AWS: Building Context-Aware Multimodal Reasoning Applications Chris Fregly
    62. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    63. AI Explained: Facts, Fiction and Future
      AI Explained: Facts, Fiction and Future Nigel Poulton
    64. Machine Learning: Unlocking Patterns and Insights with Advanced Algorithms
      Machine Learning: Unlocking Patterns and Insights with Advanced Algorithms Victor Sage
    65. The Big Pharma Conspiracy: The Drugging of America For Fast Profits
      The Big Pharma Conspiracy: The Drugging of America For Fast Profits Max Fitzer
    66. CompTIA A+ Certification Study Guide For 220-1102 Exam 2 Books In 1: Operating Systems, Software Troubleshooting, Security Awareness & Operational Procedures
      CompTIA A+ Certification Study Guide For 220-1102 Exam 2 Books In 1: Operating Systems, Software Troubleshooting, Security Awareness & Operational Procedures HISTORY FOREVER
    67. GROKKING ALGORITHMS: A Comprehensive Beginner's Guide, Tips and Tricks, Simple and Effective methods and Advanced methods to learn and use Grokking Algorithms and Data structures for Programming
      GROKKING ALGORITHMS: A Comprehensive Beginner's Guide, Tips and Tricks, Simple and Effective methods and Advanced methods to learn and use Grokking Algorithms and Data structures for Programming Eric Schmidt
    68. THE FUTURE OF HUMANITY: The Impact of Technology on Society
      THE FUTURE OF HUMANITY: The Impact of Technology on Society Felipe Chavarro Polanía
    69. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business
      Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    70. Cybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
      Cybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Trust Genics
    71. Incident Response Masterclass: Navigate and Resolve Cyber Threats with Digital Forensics Expertise
      Incident Response Masterclass: Navigate and Resolve Cyber Threats with Digital Forensics Expertise Virversity Online Courses
    72. The Battle for Your Computer: Israel and the Growth of the Global Cyber- Security Industry
      The Battle for Your Computer: Israel and the Growth of the Global Cyber- Security Industry Alon Arvatz
    73. ENIAC: The Triumphs and Tragedies of the World’s First Computer
      ENIAC: The Triumphs and Tragedies of the World’s First Computer Scott McCartney
    74. The Last Bell: Life, Death and Boxing
      The Last Bell: Life, Death and Boxing Donald McRae
    75. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
      The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
    76. Design Thinking: A comprehensive guide to design thinking and its applications
      Design Thinking: A comprehensive guide to design thinking and its applications Et Tu Code
    77. Generative AI For Dummies
      Generative AI For Dummies Pam Baker
    78. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
      Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
    79. Hackable: How to Do Application Security Right
      Hackable: How to Do Application Security Right Ted Harrington
    80. The Cuban Missile Crisis: Brink of Nuclear War
      The Cuban Missile Crisis: Brink of Nuclear War Nova Ashford
    81. Computer Systems and Networking for Beginners: A Comprehensive Beginner's Guide to understanding  Computer Systems, Networking Essentials,  and the Foundations of Digital Connectivity
      Computer Systems and Networking for Beginners: A Comprehensive Beginner's Guide to understanding Computer Systems, Networking Essentials, and the Foundations of Digital Connectivity Saimon Carrie
    82. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
    83. Facilitating Software Architecture: Empowering Teams to Make Architectural Decisions
      Facilitating Software Architecture: Empowering Teams to Make Architectural Decisions Andrew Harmel-Law

    Vælg dit abonnement

    • Over 600.000 titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned
    • 1 konto

    • 100 timer/måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Unlimited

    For dig som lytter og læser ubegrænset.

    159 kr. /måned
    • 1 konto

    • Ubegrænset adgang

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned
    • 2-6 konti

    • 100 timer/måned pr. konto

    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    2 konti

    179 kr. /måned
    Start tilbuddet

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned
    • 1 konto

    • 20 timer/måned

    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis