-
A Vulnerable System
- The History of Information Security in the Computer Age
- Narrado por: Rick Adamson
- Duración: 10 h y 15 m
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
Compra ahora por $21.49
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Resumen del Editor
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.
The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives.
Los oyentes también disfrutaron...
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- De: Andy Greenberg
- Narrado por: Ari Fliakos
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- De Mike Reaves en 01-28-23
De: Andy Greenberg
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- De: Cliff Stoll
- Narrado por: Will Damron
- Duración: 12 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- De Todd en 08-11-20
De: Cliff Stoll
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- De: Andy Greenberg
- Narrado por: Ari Fliakos
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- De Mike Reaves en 01-28-23
De: Andy Greenberg
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
The Ransomware Hunting Team
- A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
- De: Renee Dudley, Daniel Golden
- Narrado por: BD Wong
- Duración: 11 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.
-
-
Ok Book but Lacks Cohesive Story
- De Rob Chavez en 01-18-23
De: Renee Dudley, y otros
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- De: David E. Sanger
- Narrado por: Robertson Dean
- Duración: 12 h y 53 m
- Versión completa
-
General
-
Narración:
-
Historia
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
mix of information and propaganda
- De Inthego en 06-14-19
De: David E. Sanger
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- De: Richard A. Clarke, Robert K. Knake
- Narrado por: Marc Cashman
- Duración: 12 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- De Thomas Rose en 08-08-20
De: Richard A. Clarke, y otros
-
Spies, Lies, and Algorithms
- The History and Future of American Intelligence
- De: Amy B. Zegart
- Narrado por: Amy B. Zegart
- Duración: 11 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of US espionage, gives an overview of intelligence basics and life inside America's intelligence agencies, and explores the vexed issues of traitors, covert action, and congressional oversight.
-
-
Superb and insightful!
- De Cameron en 02-01-22
De: Amy B. Zegart
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- De Cristen Mini en 01-15-24
De: Matthew K. Sharp, y otros
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- De: Steven Levy
- Narrado por: Mike Chamberlain
- Duración: 20 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- De Dan Collins en 07-01-16
De: Steven Levy
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
solid advice
- De Dan Casebolt en 12-12-23
De: Rick Howard
-
The Code Book
- The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- De: Simon Singh
- Narrado por: Patty Nieman
- Duración: 10 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
In his first book since the best-selling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
-
-
D jrrg errn rq frghv << you can break this
- De Gudmundur Hardarson en 10-09-24
De: Simon Singh
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
Relacionado con este tema
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- De Fausto Cepeda en 04-03-19
De: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
-
Cyber War
- The Next Threat to National Security and What to Do About It
- De: Robert K. Knake, Richard A. Clarke
- Narrado por: Pete Larkin
- Duración: 10 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- De Britt Adams en 09-13-22
De: Robert K. Knake, y otros
-
Computing: A Concise History
- The MIT Press Essential Knowledge Series
- De: Paul E. Ceruzzi
- Narrado por: Tim Andres Pabon
- Duración: 3 h y 56 m
- Versión completa
-
General
-
Narración:
-
Historia
The history of computing could be told as the story of hardware and software or the story of the Internet or the story of "smart" handheld devices, with subplots involving IBM, Microsoft, Apple, Facebook, and Twitter. In this concise and accessible account of the invention and development of digital technology, computer historian Paul Ceruzzi offers a broader and more useful perspective. He identifies four major threads that run throughout all of computing's technological development.
-
-
Hard to Believe it an "MIT Press" Thing
- De Sam en 05-15-22
De: Paul E. Ceruzzi
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- De Fausto Cepeda en 04-03-19
De: Bruce Schneier
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- De: Ben Buchanan
- Narrado por: Christopher Grove
- Duración: 11 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- De Eric Jackson en 08-05-20
De: Ben Buchanan
-
Cyber Wars
- Hacks That Shocked the Business World
- De: Charles Arthur
- Narrado por: Joe Jameson
- Duración: 7 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
-
-
For the security professional and average joe
- De Quella en 01-11-19
De: Charles Arthur
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
-
Cyber War
- The Next Threat to National Security and What to Do About It
- De: Robert K. Knake, Richard A. Clarke
- Narrado por: Pete Larkin
- Duración: 10 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Author of the number one New York Times best seller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict -cyber war! Every concerned American should listen to this startling and explosive book that offers an insider's view of White House situation room operations and carries the listener to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation's security.
-
-
Overall not bad
- De Britt Adams en 09-13-22
De: Robert K. Knake, y otros
-
Computing: A Concise History
- The MIT Press Essential Knowledge Series
- De: Paul E. Ceruzzi
- Narrado por: Tim Andres Pabon
- Duración: 3 h y 56 m
- Versión completa
-
General
-
Narración:
-
Historia
The history of computing could be told as the story of hardware and software or the story of the Internet or the story of "smart" handheld devices, with subplots involving IBM, Microsoft, Apple, Facebook, and Twitter. In this concise and accessible account of the invention and development of digital technology, computer historian Paul Ceruzzi offers a broader and more useful perspective. He identifies four major threads that run throughout all of computing's technological development.
-
-
Hard to Believe it an "MIT Press" Thing
- De Sam en 05-15-22
De: Paul E. Ceruzzi
-
@War
- The Rise of the Military-Internet Complex
- De: Shane Harris
- Narrado por: Stephen R. Thorne
- Duración: 9 h y 43 m
- Versión completa
-
General
-
Narración:
-
Historia
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
The short history of the US and Cyber War
- De Greg en 02-06-15
De: Shane Harris
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- De: Steven Levy
- Narrado por: Rich Miller
- Duración: 14 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
-
Wish it could be updated today
- De Chip L. en 05-22-21
De: Steven Levy
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- De: Adam Segal
- Narrado por: Don Hagen
- Duración: 10 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
The Internet today connects roughly 2.7 billion people around the world, and booming interest in the "Internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization, and ownership of information.
-
-
Wrong narrator for material
- De Locnar en 02-21-17
De: Adam Segal
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- De: John P. Carlin, Garrett M. Graff
- Narrado por: Kevin Stillwell
- Duración: 16 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Exhausting
- De Raz en 01-08-19
De: John P. Carlin, y otros
-
Big Data in Practice
- How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
- De: Bernard Marr
- Narrado por: Piers Hampton
- Duración: 7 h y 25 m
- Versión completa
-
General
-
Narración:
-
Historia
The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data. Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This book fills the knowledge gap by showing how major companies are using big data every day, from an up-close, on-the-ground perspective.
-
-
Good book for managers
- De Capnbody en 01-08-18
De: Bernard Marr
-
T-Minus AI
- Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power
- De: Michael Kanaan
- Narrado por: Braden Wright
- Duración: 8 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented perspective that's easy to comprehend. A recognized national expert and the U.S. Air Force's first Chairperson for Artificial Intelligence, Kanaan weaves a compelling new view on our history of innovation and technology to masterfully explain what each of us should know about modern computing, AI, and machine learning.
-
-
Trivial Book Regarding AI
- De AstroMan en 10-30-20
De: Michael Kanaan
Lo que los oyentes dicen sobre A Vulnerable System
Calificaciones medias de los clientesReseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Kindle Customer FB
- 04-24-24
Interesting overview but incredulous adoption of U.S. official propaganda
It’s not technical so quite accessible for non technically knowledgeable readers (like myself). For technical experts (like my kids), it provides an overall historical narrative that can be interesting. One reproach is the adoption without any qualifications of the official US security State propaganda about current events (framing and allegations regarding Wikileaks, Snowden, the supposed hack by Russia of the Clinton campaign in 2016…). If you believe everything printed in the Washington Post about US national security, you will swallow everything in this book without difficulty.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña