Page de couverture de Fancy Bear Goes Phishing

Fancy Bear Goes Phishing

The Dark History of the Information Age, in Five Extraordinary Hacks

Aperçu

Essayer pour 0,00 $
Choisissez 1 livre audio par mois dans notre incomparable catalogue.
Écoutez à volonté des milliers de livres audio, de livres originaux et de balados.
L'abonnement Premium Plus se renouvelle automatiquement au tarif de 14,95 $/mois + taxes applicables après 30 jours. Annulation possible à tout moment.

Fancy Bear Goes Phishing

Auteur(s): Scott J. Shapiro
Narrateur(s): Jonathan Todd Ross
Essayer pour 0,00 $

14,95$ par mois après 30 jours. Annulable en tout temps.

Acheter pour 32,04 $

Acheter pour 32,04 $

Confirmer l'achat
Payer avec la carte finissant par
En confirmant votre achat, vous acceptez les conditions d'utilisation d'Audible et la déclaration de confidentialité d'Amazon. Des taxes peuvent s'appliquer.
Annuler

À propos de cet audio

Long-listed, Amazon.com Best Books of the Year, 2023

"Unsettling, absolutely riveting, and—for better or worse—necessary reading."—Brian Christian, author of Algorithms to Live By and The Alignment Problem

An entertaining account of the philosophy and technology of hacking—and why we all need to understand it.

It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian “Dark Avenger,” who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton’s cell phone, the Russian intelligence officers who sought to take control of a US election, and others.

In telling their stories, Shapiro exposes the hackers’ tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of Gödel, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.

A Macmillan Audio production from Farrar, Straus and Giroux.

©2023 Scott J. Shapiro (P)2023 Macmillan Audio
Histoire et culture Politiques publiques True Crime Sécurité informatique Piratage Espionnage Intéressant Programmation Internet Logiciel Militaire Surveillance Cyberguerre
activate_Holiday_promo_in_buybox_DT_T2

Ce que les critiques en disent

"Ingenious coding, buggy software, and gullibility take the spotlight in this colorful retrospective of hacking . . . Shapiro’s snappy prose manages the extraordinary feat of describing hackers’ intricate coding tactics and the flaws they exploit in a way that is accessible and captivating even to readers who don’t know Python from JavaScript. The result is a fascinating look at the anarchic side of cyberspace."Publishers Weekly

“This is an engrossing read . . . An authoritative, disturbing examination of hacking, cybercrime and techno-espionage.”Kirkus Reviews

"The question of trust is increasingly central to computing, and in turn to our world at large. Fancy Bear Goes Phishing offers a whirlwind history of cybersecurity and its many open problems that makes for unsettling, absolutely riveting, and—for better or worse—necessary reading."—Brian Christian, author of Algorithms to Live By and The Alignment Problem

Ce que les auditeurs disent de Fancy Bear Goes Phishing

Moyenne des évaluations de clients
Au global
  • 3.5 out of 5 stars
  • 5 étoiles
    1
  • 4 étoiles
    2
  • 3 étoiles
    0
  • 2 étoiles
    0
  • 1 étoile
    1
Performance
  • 3.5 out of 5 stars
  • 5 étoiles
    2
  • 4 étoiles
    0
  • 3 étoiles
    0
  • 2 étoiles
    0
  • 1 étoile
    1
Histoire
  • 3.5 out of 5 stars
  • 5 étoiles
    1
  • 4 étoiles
    1
  • 3 étoiles
    0
  • 2 étoiles
    0
  • 1 étoile
    1

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.

Classer par :
Filtrer
  • Au global
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Histoire
    1 out of 5 stars

not the best

I just wanted hacking stories. this book goes on tangents trying to explain too much not related stuff.

Un problème est survenu. Veuillez réessayer dans quelques minutes.

Vous avez donné votre avis sur cette évaluation.

Vous avez donné votre avis sur cette évaluation.