Regular price: $14.95

Membership details Membership details
  • 30 days of membership free, plus 1 audiobook and 2 Audible Originals to get you started.
  • After trial, you'll get 3 titles each month: 1 audiobook and 2 Audible Originals of your choice.
  • Don't like your audiobook? Swap it for free.
  • Cancel anytime and keep your audiobooks.
  • After your trial, Audible is just $14.95/month.
  • Get access to the Member Daily Deal
OR
In Cart

Publisher's Summary

Beginners: Each week it seems that some major corporation or another is having serious issues, thanks to the leaks of some malicious hacker. Hearing stories like this can make it seem difficult, if not impossible, for individuals and smaller organizations to ensure their own cybersecurity to keep their own information private. This defeatist attitude is just what the criminals want, however, and the truth of the matter is there is plenty you can do to improve your cybersecurity right now. 

While everyone knows that they need to exhibit some level of caution when interacting with the online world, with the bounds of technology changing all the time, this can be easier said than done. Luckily, this is where this book comes in to discuss the types of cybersecurity you should care about and how to put them to use for you in a way that is proven to be effective in both the short and the long-term. 

Inside you will find easy ways to identify potential security threats at a glance, top cyber threats and how to stop them in their tracks, ways to put the world’s crippling shortage of cybersecurity professional to work for you, tips for ensuring your personal cybersecurity is up to snuff, special considerations to keep in mind when keeping your smart devices secure, and more.

Intermediate: The purpose of this book is to inform listeners about cybersecurity, hackers, and the Internet in general. A lot of people are unaware how hackers can get their privileged information or what security measures they need to take in order to avoid falling victim to these hackers or cybercriminals. 

This book explains the types of threats that people can be exposed to while their device is connected to a network, why hackers engage in the activities that they do, what happens to personal data once it has been compromised, and much more.

Advanced: The book considers the problems of related to cyber security in the individual, as well as the organizational setting. Cyber security is essential to the organization considering the growing technological dependencies that organizations are continuously facing. The book considers the nature of threats of cyber-crime from hacking to data manipulation.

The text also considers intrusions related to corruption of information and its theft where the organization suffers from loss of crucial data. Conversely, there is data manipulation where the information is corrupted without the knowledge of the users in the organization. The book tackles the methods of dealing with these types of intrusions and how to mitigate risk through policy changes.

These policies are known as risk management framework for the organizations to secure their data from the basic levels to advanced security settings. These include the steps for cyber security planning maturity, addressing process risks and elements related to personnel vulnerabilities.

©2018 Zapata Publishing (P)2018 Zach Webber

What members say

Average Customer Ratings

Overall

  • 5 out of 5 stars
  • 5 Stars
    25
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    1

Performance

  • 5 out of 5 stars
  • 5 Stars
    23
  • 4 Stars
    2
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0

Story

  • 5 out of 5 stars
  • 5 Stars
    23
  • 4 Stars
    2
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Sort by:
  • Overall
    5 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    5 out of 5 stars

marvelous guide

Very helpful for getting into the field. Covers the basics and informative. quite helpful, too!

1 of 1 people found this review helpful

  • Overall
    5 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    5 out of 5 stars

intelligent guide


A well thought out, intelligently written book on digital security issues and how to combat them, both before and after an attack. Great use of index of terms with their definitions at the end of the book.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

I learned so much information

I learned so much information and events about cyber security that I once never knew! Very helpful for getting into the field. Covers the basics and informative.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

highly recommended


I found this to be a very good book on Cybersecurity. This book is very readable and one that I will likely refer back to often. The authors provide excellent resources, tools and websites to refer to for further study.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

strongly recommended


This is one of the best book for Cyber Security. I strongly recommend this book who wants to learn about cybersecurity and cyber security attack vectors and also cyber defense strategies.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

well explained


A very useful book just the right approach for a pragmatic and actionable introduction. I recommend this book.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars

enjoy listening


Great book. I enjoyed reading. I think this book appeals to both experts in the field as well as those who want to learn more about cybersecurity. There is enough technical detail, yet enjoyable read.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars

nice book


A very useful book just the right approach for a pragmatic and actionable introduction. I recommend this book.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

nice book


It is very important to see the panaromic view of the realm of cyber security. What are the possible strategies for defending your system? Here I found detailed yet clean answers.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great book,

All computers and devices are attacked by viruses, banking networks are attacked regularly, databases of the state are daily trying to be hacked . Someone wants to gain access to our information all the time and it must be reliably protected at all levels, and the more the security expert is aware, the more possible attempts to crack and steal data it can prevent. To protect my data and personal information I’d like to know more about cyber security in order to get my information safe.

Sort by:
  • Overall
    2 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    3 out of 5 stars
  • Simon
  • 01-04-19

A robot reading it?

This seemed like good information, but the actor reading it was relentless, unpausing, and very difficult to listen to. Was it an automated text to speech program?

Couldn't finish.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Faizal
  • 12-19-18

effective book

The awesome book that can teach you more and quickly than on your own. I'd highly recommend this book for anyone who is wishing to start their career with well acknowledge.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Hass
  • 12-19-18

amazing guide

Such an amazing book bundle. The author has able to teach you all essential details on an easy and simple way for your better understanding. He uses great and clear illustrations for sufficient knowledge. Well-written books that really makes you learn in just a short time. Great.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Layana
  • 12-19-18

follow this book

This was a great book for listeners. It had a lot of very general, yet very useful advice for users. I loved the 2nd chapter very much.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Emilio
  • 12-16-18

very well written

This book is a very sensible and easy approach for anyone interested in the field of cybersecurity.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Kazuo
  • 12-16-18

inspiring book

Inspiring book. Also this primes the listener into the finding and exploring developments in this field.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Jupiter
  • 12-16-18

Pleasant book

It helps a ton and it is amazingly a learners manual for programming. It is a mind blowing guide and the progression are clear. By and by I understand that if you have an amazing book

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Horatio
  • 12-16-18

works best

started reading this book without any prior experience with cybersecurity. I finished with a solid, overview level understanding of the various skills and technologies necessary to work as an entry-level software developer.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Francisco
  • 12-16-18

user friendly

This is a wonderful book. I would recommend it to anyone with a firm grasp of the basics, or as a tune-up for advanced users.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
  • Gibson
  • 12-16-18

Wonderful book

Loved the book and listening to Zach Webber was thoroughly enjoyable. I will definitely be following the strategy and advice given here.