Taming the Hacking Storm (eBook)
337 Seiten
Wiley (Verlag)
978-1-394-34960-9 (ISBN)
A transformative new approach to Internet security from an experienced industry expert
Taming the Hacking Storm: A Framework for Defeating Hackers and Malware is a groundbreaking new roadmap to solving the ubiquitous Internet security issues currently plaguing countries, businesses, and individuals around the world. In easy-to-understand and non-technical language, author and cybersecurity veteran Roger Grimes describes the most prevalent threats to our online safety today and what ties them all together. He goes on to lay out a comprehensive and robust framework for combating that threat-one that rests on a foundation of identity verification-and explains exactly how to implement it in the real world.
The author addresses each of the challenges, pitfalls, and roadblocks that might stand in the way of his solutions, offering practical ways to navigate, avoid, or counter those impediments. The book also includes:
- How to address peripheral security issues, including software and firmware vulnerabilities
- Strategies for addressing a lack of international agreement on the implementation of security standards and practices
- Things you can do today to encourage the development of a more secure, trusted Internet
An insightful and original new approach to cybersecurity that promises to transform the way we all use the Internet, Taming the Hacking Storm is a must-read guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
ROGER A. GRIMES is a technical author and computer security veteran with 36 years' experience in the IT industry. He is the Data-Driven Defense Evangelist at KnowBe4, a human risk management company, as well as a senior computer security consultant and cybersecurity architect. He specializes in hackers, malware, identity management, Windows computer security, host security, and quantum computing.
A transformative new approach to Internet security from an experienced industry expert Taming the Hacking Storm: A Framework for Defeating Hackers and Malware is a groundbreaking new roadmap to solving the ubiquitous Internet security issues currently plaguing countries, businesses, and individuals around the world. In easy-to-understand and non-technical language, author and cybersecurity veteran Roger Grimes describes the most prevalent threats to our online safety today and what ties them all together. He goes on to lay out a comprehensive and robust framework for combating that threat one that rests on a foundation of identity verification and explains exactly how to implement it in the real world. The author addresses each of the challenges, pitfalls, and roadblocks that might stand in the way of his solutions, offering practical ways to navigate, avoid, or counter those impediments. The book also includes: How to address peripheral security issues, including software and firmware vulnerabilities Strategies for addressing a lack of international agreement on the implementation of security standards and practices Things you can do today to encourage the development of a more secure, trusted Internet An insightful and original new approach to cybersecurity that promises to transform the way we all use the Internet, Taming the Hacking Storm is a must-read guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
| Erscheint lt. Verlag | 26.3.2025 |
|---|---|
| Sprache | englisch |
| Themenwelt | Mathematik / Informatik ► Informatik ► Theorie / Studium |
| Schlagworte | cybercrime • cybercrime book • cybercrime solutions • cybersecurity • Cybersecurity book • hacking solutions • internet privacy • Internet Security • malware solutions • online identity verification • Online privacy • Online Security • threat modeling |
| ISBN-10 | 1-394-34960-2 / 1394349602 |
| ISBN-13 | 978-1-394-34960-9 / 9781394349609 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich