Listening In: Cybersecurity in an Insecure Age

[Susan Landau] ☆ Listening In: Cybersecurity in an Insecure Age ↠ Download Online eBook or Kindle ePUB. Listening In: Cybersecurity in an Insecure Age And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.. presidential election. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. A

Listening In: Cybersecurity in an Insecure Age

Author :
Rating : 4.42 (824 Votes)
Asin : 0300227442
Format Type : paperback
Number of Pages : 240 Pages
Publish Date : 2016-08-13
Language : English

DESCRIPTION:

"Susan Landau is eminently qualified to guide readers to deeper understanding of risks and threats that accompany an increasingly connected world. Our online appetites are growing and our presence attracts hacking and surveillance among other uses we may not have authorized or even anticipated. Must read."—Vint Cerf, internet pioneer

And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.. presidential election. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers and misinformed policymakers New technologies have provided both incredible convenience and new threats.   And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protec

OTHER BOOK COLLECTION