You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
When Vera said goodbye to Poland, she never imagined that her return would be to her father’s deathbed. Aside from bringing forth waves of unwanted emotions, her trip back home also gives her reason to suspect foul play, and so she launches into an investigation of her own. With her return to London comes a new coworker, the newly hired ethical hacker whose charm and wit captures Vera’s attention. Soon after, the workaholic finds herself caught in the whirlpool of office romance. But a flight back home turns out to be a one-way trip to a jail cell. Left to prove her innocence within a 30-day timeline, Vera starts questioning everything she knows about her would-have-been romantic partner. Can Vera handle the hacker world that Craig belongs to?
Learn how to build a proactive cybersecurity culture together with the rest of your C-suite to effectively manage cyber risks Key FeaturesEnable business acceleration by preparing your organization against cyber risksDiscover tips and tricks to manage cyber risks in your organization and build a cyber resilient businessUnpack critical questions for the C-suite to ensure the firm is intentionally building cyber resilienceBook Description With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in inc...
Welcome to Better, Simpler Cyber: A Business-Based Guide to Cyber Risk Management! In these challenging times, businesses need to find ways to stay ahead of their competition, and improving their cybersecurity posture is one of the most effective ways to do so. However, blindly investing in expensive cybersecurity tools and solutions is not always the answer. What businesses need is the right approach and people in place to manage their cyber risks effectively. This book is designed to help you understand how to manage cyber risk in a way that supports your business goals and objectives. It covers the entire cyber risk management process, including identifying your exposure to cyber risks, a...
In today's global economy, the importance of third-party relationships in the supply chain cannot be overstated. Suppliers, partners, vendors, and service providers are essential to the success of businesses across all industries. However, with this reliance on third parties comes significant risks that can quickly spiral out of control, leading to disastrous consequences. In "Supply Chain Roulette," we explore the critical role of third-party relationships and provide practical strategies for managing these risks effectively. Our comprehensive guide draws on real-world examples and case studies to illustrate the devastating consequences of overlooking supply chain risks, such as reputationa...
If the past few years have taught us anything, it is that the only thing we can predict about the future is: It is unpredictable. How do businesses — in particular smaller companies — ready themselves for this future?This general management book serves as an introductory reading for academics, practitioners, and graduate (MBA) students interested in understanding future readiness and the significance of small and medium-sized enterprises (SMEs) in driving the global economy and sustainability agenda. Covering topics like societal impact, technology, change management, talent, and leadership, this book highlights unique strategies for SMEs to be more future-ready. Featuring case studies o...
Cyber Risk Leaders: Global C-Suite Insights - Leadership and Influence in the Cyber Age’, by Shamane Tan - explores the art of communicating with executives, tips on navigating through corporate challenges, and reveals what the C-Suite looks for in professional partners. For those who are interested in learning from top industry leaders, or an aspiring or current CISO, this book is gold for your career. It’s the go-to book and your CISO kit for the season.
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm Scott Schober, as he struggles to understand: the motives and mayhem behind his being hacked. As a small business owner, family man and tech pundit, Scott finds himself leading a compromised life. By day, he runs a successful security company and reports on the latest cyber breaches in the hopes of offering solace and security tips to millions of viewers. But by night, Scott begins to realize his worst fears are only a hack away as he falls prey to an invisible enemy. When a mysterious hacker begins to steal thousands from his bank account, go through his trash and rake over his social ...
Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking ExposedTM Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology. • Learn how malware infects, survives, and propagates across ...
THE FUTRE IS OURS When humans first evolved, we were basically indistinguishable from animals. Then we harnessed the power of fire, and it catapulted us beyond a state of animalism. Since then, human innovation has propelled us from one technological revolution to the next. We are now at the next world-altering wave of technological evolution: artificial intelligence. But the current AI offerings cannot fulfill our fundamental desire to communicate with our technology through speech. We didn't evolve to type or use a mouse; we evolved to have conversations, including with our technology. We want the USS Enterprise shipboard computer, J.A.R.V.I.S. from Iron Man, the interface from Her. But we...