Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Taming the Hacking Storm
A Framework for Defeating Hackers and Malware
Taschenbuch von Roger A Grimes
Sprache: Englisch

39,95 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 2-3 Wochen

Produkt Anzahl: Gib den gewünschten Wert ein oder benutze die Schaltflächen um die Anzahl zu erhöhen oder zu reduzieren.
Kategorien:
Beschreibung

AN EXPERT DEMONSTRATION OF WEAVING SECURITY INTO YOUR ORGANISATION'S CULTURE

In Taming the Hacking Storm: A Framework for Defeating Hackers and Malware, 36-year veteran of the computer security industry, Roger Grimes, delivers a comprehensive and carefully considered solution to hacking and malware. Grimes pulls together a wide variety of ideas to create a cohesive set of strategies for dealing with the most pressing cybersecurity issues present on the internet today.

Using a framework based on robust identity verification, the author explains exactly how to apply his techniques in the real world. He walks you through the challenges, pitfalls, and roadblocks that stand in the way of the worldwide implementation of Grimes' solutions and provides straightforward prescriptions for dealing with those impediments. The book also examines peripheral security issues, including software and firmware vulnerabilities, incomplete or delayed software patching, and a lack of agreement between countries on internet security issues.

Taming the Hacking Storm is a revolutionary new take on internet security that's perfect for anyone interested in cybersecurity, as well as professionals in the cybersecurity industry, internet security organizations, and cybersecurity researchers in academia.

AN EXPERT DEMONSTRATION OF WEAVING SECURITY INTO YOUR ORGANISATION'S CULTURE

In Taming the Hacking Storm: A Framework for Defeating Hackers and Malware, 36-year veteran of the computer security industry, Roger Grimes, delivers a comprehensive and carefully considered solution to hacking and malware. Grimes pulls together a wide variety of ideas to create a cohesive set of strategies for dealing with the most pressing cybersecurity issues present on the internet today.

Using a framework based on robust identity verification, the author explains exactly how to apply his techniques in the real world. He walks you through the challenges, pitfalls, and roadblocks that stand in the way of the worldwide implementation of Grimes' solutions and provides straightforward prescriptions for dealing with those impediments. The book also examines peripheral security issues, including software and firmware vulnerabilities, incomplete or delayed software patching, and a lack of agreement between countries on internet security issues.

Taming the Hacking Storm is a revolutionary new take on internet security that's perfect for anyone interested in cybersecurity, as well as professionals in the cybersecurity industry, internet security organizations, and cybersecurity researchers in academia.

Über den Autor

ROGER A. GRIMES is a technical author and computer security veteran with 36 years' experience in the IT industry. He is the Data-Driven Defense Evangelist at KnowBe4, a human risk management company, as well as a senior computer security consultant and cybersecurity architect. He specializes in hackers, malware, identity management, Windows computer security, host security, and quantum computing.

Inhaltsverzeichnis

About the Author vii

Preface xi

About This Book xxi

Acknowledgments xxiii

Chapter Summaries xxv

Part I: Identifying the Problem 1

Chapter 1: How Bad Is Internet Security? 3

Chapter 2: How We Are Attacked and Why 25

Chapter 3: The Problem 45

Chapter 4: Challenges 60

Part II: The Technology Solution 75

Chapter 5: The Solution 77

Chapter 6: Technology Solution Summary 95

Chapter 7: Trusted Identity 109

Chapter 8: Safe and Trusted Devices 140

Chapter 9: Trusted OSs and Apps 166

Chapter 10: Trusted Networks 191

Chapter 11: Trust Assurance Service 205

Chapter 12: Internet Security Global Alliance 222

Part III: Challenging the Solution 235

Chapter 13: Threat Modeling 237

Chapter 14: Common Questions 252

Part IV: Other Needed Solutions 261

Chapter 15: Secure Coding 263

Chapter 16: Better Patching 272

Chapter 17: Getting International Agreements 282

Chapter 18: What You Can Do 288

Index 297

Details
Erscheinungsjahr: 2025
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Einband - flex.(Paperback)
ISBN-13: 9781394349586
ISBN-10: 1394349580
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Grimes, Roger A
Hersteller: Wiley
Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de
Maße: 231 x 185 x 25 mm
Von/Mit: Roger A Grimes
Erscheinungsdatum: 08.04.2025
Gewicht: 0,522 kg
Artikel-ID: 132516916
Über den Autor

ROGER A. GRIMES is a technical author and computer security veteran with 36 years' experience in the IT industry. He is the Data-Driven Defense Evangelist at KnowBe4, a human risk management company, as well as a senior computer security consultant and cybersecurity architect. He specializes in hackers, malware, identity management, Windows computer security, host security, and quantum computing.

Inhaltsverzeichnis

About the Author vii

Preface xi

About This Book xxi

Acknowledgments xxiii

Chapter Summaries xxv

Part I: Identifying the Problem 1

Chapter 1: How Bad Is Internet Security? 3

Chapter 2: How We Are Attacked and Why 25

Chapter 3: The Problem 45

Chapter 4: Challenges 60

Part II: The Technology Solution 75

Chapter 5: The Solution 77

Chapter 6: Technology Solution Summary 95

Chapter 7: Trusted Identity 109

Chapter 8: Safe and Trusted Devices 140

Chapter 9: Trusted OSs and Apps 166

Chapter 10: Trusted Networks 191

Chapter 11: Trust Assurance Service 205

Chapter 12: Internet Security Global Alliance 222

Part III: Challenging the Solution 235

Chapter 13: Threat Modeling 237

Chapter 14: Common Questions 252

Part IV: Other Needed Solutions 261

Chapter 15: Secure Coding 263

Chapter 16: Better Patching 272

Chapter 17: Getting International Agreements 282

Chapter 18: What You Can Do 288

Index 297

Details
Erscheinungsjahr: 2025
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Einband - flex.(Paperback)
ISBN-13: 9781394349586
ISBN-10: 1394349580
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Grimes, Roger A
Hersteller: Wiley
Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de
Maße: 231 x 185 x 25 mm
Von/Mit: Roger A Grimes
Erscheinungsdatum: 08.04.2025
Gewicht: 0,522 kg
Artikel-ID: 132516916
Sicherheitshinweis

Ähnliche Produkte

Ähnliche Produkte