Page de couverture de Cybersecurity

Cybersecurity

What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners

Aperçu

Essayer pour 0,00 $
Choisissez 1 livre audio par mois dans notre incomparable catalogue.
Écoutez à volonté des milliers de livres audio, de livres originaux et de balados.
L'abonnement Premium Plus se renouvelle automatiquement au tarif de 14,95 $/mois + taxes applicables après 30 jours. Annulation possible à tout moment.

Cybersecurity

Auteur(s): Lester Evans
Narrateur(s): Michael Reaves, Brian R. Scott
Essayer pour 0,00 $

14,95$ par mois après 30 jours. Annulable en tout temps.

Acheter pour 25,00 $

Acheter pour 25,00 $

Confirmer l'achat
Payer avec la carte finissant par
En confirmant votre achat, vous acceptez les conditions d'utilisation d'Audible et la déclaration de confidentialité d'Amazon. Des taxes peuvent s'appliquer.
Annuler

À propos de cet audio

If you want to avoid getting hacked, having your information spread and discover the world of ethical hacking then pay attention....

Two manuscripts in one audiobook:

  • Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
  • Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks, Including Tips on Social Engineering

Do you create tons of accounts you will never again visit?

Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts?

Does your password contain a sequence of numbers, such as “123456”?

Do you automatically click all links and download all email attachments coming from your friends?

This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.

In part one of this audiobook, you will learn about:

  • How hackers use raunchy photos to eke out private information
  • Examples of preposterous social engineering attacks
  • How there's only one surefire way to protect against hacking
  • How to lower your exposure to hacking
  • Why companies pester you to attach a phone number to an account
  • Why social media is the most insecure way to spend your afternoon and much, much more

Some of the topics covered in part two of this audiobook include:

  • Fighting against companies
  • Ethical hacking defined
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How a hacker could go about hacking your Wi-Fi and much, much more!
©2019 Lester Evans (P)2019 Lester Evans
Histoire et culture Sécurité et chiffrement Computer Security Computer Engineering
activate_Holiday_promo_in_buybox_DT_T2

Ce que les auditeurs disent de Cybersecurity

Moyenne des évaluations de clients
Au global
  • 2.5 out of 5 stars
  • 5 étoiles
    0
  • 4 étoiles
    0
  • 3 étoiles
    1
  • 2 étoiles
    1
  • 1 étoile
    0
Performance
  • 4 out of 5 stars
  • 5 étoiles
    0
  • 4 étoiles
    1
  • 3 étoiles
    0
  • 2 étoiles
    0
  • 1 étoile
    0
Histoire
  • 4 out of 5 stars
  • 5 étoiles
    0
  • 4 étoiles
    1
  • 3 étoiles
    0
  • 2 étoiles
    0
  • 1 étoile
    0

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.

Classer par :
Filtrer
  • Au global
    2 out of 5 stars

meanders through vaguely useful information

there were interesting bits but was overall some scattered thoughts about a broad topic that had no real purpose and didn't lead to any destination.

Un problème est survenu. Veuillez réessayer dans quelques minutes.

Vous avez donné votre avis sur cette évaluation.

Vous avez donné votre avis sur cette évaluation.

  • Au global
    3 out of 5 stars
  • Performance
    4 out of 5 stars
  • Histoire
    4 out of 5 stars

An interesting read, not a guide or study manual

I enjoyed listening to the book... it was interesting and shared many anecdotes about cybersecurity in the world we live in. I wouldn't call it as essential guide... in fact, not a guide at all. The writer was very opinionated about certain powers that be, so whether you agree or not is up to you. It did make me question the way I do things in regards to privacy. Is recommend it as an interesting read but but a beginner's guide to ethical hacking. Narration was good.

Un problème est survenu. Veuillez réessayer dans quelques minutes.

Vous avez donné votre avis sur cette évaluation.

Vous avez donné votre avis sur cette évaluation.