Audible会員プラン登録で、12万以上の対象タイトルが聴き放題。

  • Cybersecurity

  • What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
  • 著者: Lester Evans
  • ナレーター: Michael Reaves, Brian R. Scott
  • 再生時間: 6 時間 34 分

聴き放題対象外タイトルです。Audible会員登録で、非会員価格の30%OFFで購入できます。

無料体験で、12万以上の対象作品が聴き放題に
オフライン再生可能
プロの声優や俳優の朗読も楽しめる
Audibleでしか聴けない本やポッドキャストも多数
無料体験終了後は月会費1,500円。いつでも退会できます。
『Cybersecurity』のカバーアート

Cybersecurity

著者: Lester Evans
ナレーター: Michael Reaves, Brian R. Scott
¥ 1,750で会員登録し購入

無料体験終了後は月額¥1,500。いつでも退会できます。

¥ 2,500 で購入

¥ 2,500 で購入

下4桁がのクレジットカードで支払う
ボタンを押すと、Audibleの利用規約およびAmazonのプライバシー規約同意したものとみなされます。支払方法および返品等についてはこちら

あらすじ・解説

If you want to avoid getting hacked, having your information spread and discover the world of ethical hacking then pay attention.... 

Two manuscripts in one audiobook: 

  • Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
  • Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks, Including Tips on Social Engineering

Do you create tons of accounts you will never again visit? 

Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts? 

Does your password contain a sequence of numbers, such as “123456”? 

Do you automatically click all links and download all email attachments coming from your friends? 

This audiobook will show you just how incredibly lucky you are that nobody's hacked you before. 

In part one of this audiobook, you will learn about: 

  • How hackers use raunchy photos to eke out private information
  • Examples of preposterous social engineering attacks
  • How there's only one surefire way to protect against hacking
  • How to lower your exposure to hacking
  • Why companies pester you to attach a phone number to an account 
  • Why social media is the most insecure way to spend your afternoon and much, much more

Some of the topics covered in part two of this audiobook include: 

  • Fighting against companies
  • Ethical hacking defined
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How a hacker could go about hacking your Wi-Fi and much, much more!
©2019 Lester Evans (P)2019 Lester Evans

Cybersecurityに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。