Taming the Hacking Storm
audiobook (Unabridged) ∣ A Framework for Defeating Hackers and Malware
By Roger A. Grimes
Sign up to save your library
With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.
Find this title in Libby, the library reading app by OverDrive.

Search for a digital library with this title
Title found at these libraries:
Library Name | Distance |
---|---|
Loading... |
Taming the Hacking Storm is a groundbreaking new roadmap to solving the Internet security issues currently plaguing countries, businesses, and individuals around the world. In easy-to-understand and non-technical language, cybersecurity veteran Roger Grimes describes the most prevalent threats to our online safety today and what ties them all together. He goes on to lay out a comprehensive and robust framework for combating that threatone that rests on a foundation of identity verificationand explains exactly how to implement it in the real world.
The author addresses each of the challenges, pitfalls, and roadblocks that might stand in the way of his solutions, offering practical ways to navigate, avoid, or counter those impediments. The book also includes advice on how to address peripheral security issues, including software and firmware vulnerabilities; strategies for addressing a lack of international agreement on the implementation of security standards and practices; and things you can do today to encourage the development of a more secure, trusted Internet.
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
The author addresses each of the challenges, pitfalls, and roadblocks that might stand in the way of his solutions, offering practical ways to navigate, avoid, or counter those impediments. The book also includes advice on how to address peripheral security issues, including software and firmware vulnerabilities; strategies for addressing a lack of international agreement on the implementation of security standards and practices; and things you can do today to encourage the development of a more secure, trusted Internet.
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.