Cyber Risk Leaders

My Security Media Pty Ltd
Free sample

Cyber Risk Leaders: Global C-Suite Insights - Leadership and Influence in the Cyber Age’, by Shamane Tan - explores the art of communicating with executives, tips on navigating through corporate challenges, and reveals what the C-Suite looks for in professional partners. For those who are interested in learning from top industry leaders, or an aspiring or current CISO, this book is gold for your career. It’s the go-to book and your CISO kit for the season.
Read more
Collapse

About the author

Shamane Tan advises C-Suite on uplifting their cyber risk and corporate security posture.


She is an international speaker and Founder of Cyber Risk Meetups, a platform for security executives to share innovative insights and war stories.

Read more
Collapse
Loading...

Additional Information

Publisher
My Security Media Pty Ltd
Read more
Collapse
Published on
Dec 31, 2019
Read more
Collapse
Pages
149
Read more
Collapse
ISBN
9780648595311
Read more
Collapse
Read more
Collapse
Best For
Read more
Collapse
Language
English
Read more
Collapse
Genres
Business & Economics / Leadership
Computers / Cybernetics
Computers / Security / General
Read more
Collapse
Content Protection
This content is DRM protected.
Read more
Collapse
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
******** More than 1,000 copies sold in first month of launch *********

According to Einstein, “There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY”. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes”.

This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can’t prevent fully but can minimize the chances of being a victim.

It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!

I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.

=========================

Contents Overview:

Introduction

Classification of Hackers

Why do they hack?

Phases of Hacking

Methods of Hacking and Preventive Actions

Digital Foot-printing

Social Engineering

Password Cracking

Passive Attacks

Keyloggers

Denial of Service (Dos Attack)

SQL Injection

XSS (Cross site Scripting)

Cross Site Request Forgery, CSRF

Spoofing

Stenography

Man In The Middle, MITM

Malwares

Bonus: Google Hacking Tools that assist Hackers

Prevention from Hackers

Laws and Liabilities in India

Case Study

Aadhaar data breach – January

Facebook data breach – March

Facebook data breach – Sep

Yahoo! Data breaches – August

LinkedIn breach – May

©2019 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.