Cyber Hacking copertina

Cyber Hacking

Wars in Virtual Space

Anteprima
Iscriviti ora Iscriviti ora
Offerta valida fino alle 23.59 del 29 gennaio 2026.
Dopo 30 giorni (60 per i membri Prime), 9,99 €/mese. Puoi cancellare ogni mese
Risparmio di più del 90% nei primi 3 mesi.
Ascolto illimitato della nostra selezione in continua crescita di migliaia di audiolibri, podcast e Audible Original.
Nessun impegno. Puoi cancellare ogni mese.
Disponibile su ogni dispositivo, anche senza connessione.
Ascolta senza limiti migliaia di audiolibri, podcast e serie originali
Disponibile su ogni dispositivo, anche senza connessione
9,99 € al mese. Puoi cancellare ogni mese.

Cyber Hacking

Di: Scientific American
Letto da: George Newbern
Iscriviti ora Iscriviti ora

3 mesi a soli 0,99 €/mese, dopodiché 9,99 €/mese. Possibilità di disdire ogni mese. L'offerta termina il 29 gennaio 2026 alle 23:59.

Dopo 30 giorni (60 per i membri Prime), 9,99 €/mese. Cancella quando vuoi.

Acquista ora a 9,95 €

Acquista ora a 9,95 €

3 mesi a soli 0,99 €/mese

Dopo 3 mesi, 9,99 €/mese. Si applicano termini e condizioni.

A proposito di questo titolo

Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is performed online. We are living digital lifestyles. While this transformation has opened up exciting new frontiers, it also opens the door to security threats undreamed of in previous generations.

In Cyber Hacking: Wars in Virtual Space, we peer behind the cyber curtain. First, we look at the hackers - who they are, how they work, their motivations, and methods. The opening article examines hardware - specifically microprocessors and why they are vulnerable to tampering. Then we turn to the internal attacks, the worms and viruses whose resulting damage ranges from merely inconvenient and attention-getting to expensive and dangerous. Next, we take a broad look at issues of privacy and the technology used to gather and track personal information. With so much personal information volunteered on social networking and other sites, how much privacy can people expect? Most of us leave a trail of data wherever we go. On a positive note, we end by covering innovative technologies used to secure cyber networks and safeguard information.

The race between the hackers and information security professionals continues.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2017 by Scientific American, a division of Nature America, Inc. Scientific American is a registered trademark of Nature America, Inc. (P)2020 by Blackstone Publishing
Ingegneria
Ancora nessuna recensione