E-Book, Englisch, 304 Seiten, Web PDF
Barker Hacked
1. Auflage 2024
ISBN: 978-1-3986-1371-3
Verlag: Kogan Page
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
The Secrets Behind Cyber Attacks
E-Book, Englisch, 304 Seiten, Web PDF
ISBN: 978-1-3986-1371-3
Verlag: Kogan Page
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats.
Hacked offers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target.
Featuring expert commentary from world-leading cybersecurity experts and ethical hackers, this book uncovers the fascinating stories of the most insidious and notorious cyber attacks, including how the Mirai malware almost took down the internet and how a supply chain attack infiltrated the US government and other global institutions.
From social engineering and data theft to ransomware and Distributed Denial-of-Service (DDoS) attacks, there are numerous strategies that hackers use to target our finances and data. Uncover their secrets and learn how to safeguard your data with Hacked.
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Wirtschaftswissenschaften Betriebswirtschaft Management Risikomanagement
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Computerkriminalität & Hacking
Weitere Infos & Material
Chapter - 00: Introduction: the groups behind cyber attacks; Chapter - 01: Phishing; Chapter - 02: Account compromise; Chapter - 03: Vulnerabilities and exploits; Chapter - 04: Romance fraud; Chapter - 05: Cyber fraud; Chapter - 06: Identity fraud; Chapter - 07: Social media scams; Chapter - 08: Malicious insiders; Chapter - 09: Malware; Chapter - 10: Ransomware; Chapter - 11: The internet of things; Chapter - 12: Cryptocurrency crime; Chapter - 13: Artificial intelligence; Chapter - 14: Conclusion: staying safe from cyber attacks;