Summary of Scott J. Shapiro's Fancy Bear Goes Phishing
Written by Milkyway Media
Narrated by Digital Voice Maxwell G
()
About this audiobook
This audiobook is narrated by a digital voice.
Listen to the Summary of Scott J. Shapiro's Fancy Bear Goes Phishing in 20 minutes. Please note: This is a summary & not the original book. "Fancy Bear Goes Phishing" by Scott J. Shapiro delves into the history of cybersecurity, tracing its evolution from the secure mainframes of the 1960s to the vulnerable networked systems of today. Shapiro recounts the story of Robert Morris Jr., who released a worm into the internet, causing widespread disruption and raising awareness of cyber-insecurity. The book discusses the tension between computing convenience and security, highlighting the impact of films like "WarGames" and the subsequent government and legislative responses to cyber threats...
More audiobooks from Milkyway Media
Summary of Mindy Pelz's Fast Like a Girl Rating: 0 out of 5 stars0 ratingsSummary of Dan Martell's Buy Back Your Time Rating: 5 out of 5 stars5/5Summary of Noah Kagan's Million Dollar Weekend Rating: 5 out of 5 stars5/5Summary of Michael Nehls's The Indoctrinated Brain Rating: 5 out of 5 stars5/5Summary of Steven Bartlett's The Diary of a CEO Rating: 5 out of 5 stars5/5Summary of Mary Claire Haver's The Galveston Diet Rating: 5 out of 5 stars5/5Summary of Cal Newport's Slow Productivity Rating: 5 out of 5 stars5/5Summary of Gabor Maté's Scattered Minds Rating: 5 out of 5 stars5/5Summary of Shane Parrish's Clear Thinking Rating: 5 out of 5 stars5/5Summary of Mustafa Suleyman's The Coming Wave Rating: 5 out of 5 stars5/5Summary of Charles Duhigg's Supercommunicators Rating: 0 out of 5 stars0 ratingsSummary of Rick Rubin's The Creative Act Rating: 5 out of 5 stars5/5Summary of Abigail Shrier's Bad Therapy Rating: 5 out of 5 stars5/5Summary of David Brooks's How to Know a Person Rating: 5 out of 5 stars5/5Summary of David Goggins's Never Finished Rating: 0 out of 5 stars0 ratingsSummary of Gabor Maté's The Myth of Normal Rating: 0 out of 5 stars0 ratingsSummary of Will Guidara's Unreasonable Hospitality Rating: 5 out of 5 stars5/5Summary of Ryan Holiday's Discipline Is Destiny Rating: 5 out of 5 stars5/5Summary of Nassim Nicholas Taleb's Antifragile Rating: 0 out of 5 stars0 ratingsSummary of Ali Abdaal's Feel Good Productivity Rating: 5 out of 5 stars5/5Summary of Robert M. Sapolsky's Determined Rating: 5 out of 5 stars5/5Summary of Michael Easter's Scarcity Brain Rating: 5 out of 5 stars5/5Summary of Chris van Tulleken’s Ultra-Processed People Rating: 5 out of 5 stars5/5Summary of Charles T. Munger's Poor Charlies Almanack Rating: 0 out of 5 stars0 ratingsSummary of Benjamin Bikman & Jason Fung's Why We Get Sick Rating: 0 out of 5 stars0 ratingsSummary of Carol Tavris & Avrum Bluming's Estrogen Matters Rating: 0 out of 5 stars0 ratingsSummary of Katherine Morgan Schafler's The Perfectionist's Guide to Losing Control Rating: 5 out of 5 stars5/5Summary of Thomas Sowell's Social Justice Fallacies Rating: 0 out of 5 stars0 ratingsSummary of Sally K. Norton's Toxic Superfoods Rating: 0 out of 5 stars0 ratingsSummary of Nick Trenton's The Art of Letting Go Rating: 0 out of 5 stars0 ratings
Related to Summary of Scott J. Shapiro's Fancy Bear Goes Phishing
Related audiobooks
Summary of Nicole Perlroth's This Is How They Tell Me the World Ends Rating: 0 out of 5 stars0 ratingsA Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Worm: The First Digital World War Rating: 4 out of 5 stars4/5Greatest Hackers in the History Rating: 4 out of 5 stars4/5Digital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsSummary of Kim Zetter's Countdown to Zero Day Rating: 0 out of 5 stars0 ratingsThe Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election Rating: 4 out of 5 stars4/5The Case for Killer Robots Rating: 0 out of 5 stars0 ratingsSummary of Byron Tau's Means of Control Rating: 5 out of 5 stars5/5Biggest Cyber Crimes in the History Rating: 5 out of 5 stars5/5Spies, Lies, and Algorithms: The History and Future of American Intelligence Rating: 5 out of 5 stars5/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5Rise of the Machines: A Cybernetic History Rating: 4 out of 5 stars4/5The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5Vanished Connections: Unraveling Digital Disappearances, Serial Killers, True Crime, Cybercrime Rating: 0 out of 5 stars0 ratingsSummary of Andy Greenberg's Sandworm Rating: 4 out of 5 stars4/5Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Habeas Data: Privacy vs. the Rise of Surveillance Tech Rating: 5 out of 5 stars5/5Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth Rating: 4 out of 5 stars4/5Digitize and Punish: Racial Criminalization in the Digital Age Rating: 5 out of 5 stars5/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Computing: A Concise History Rating: 4 out of 5 stars4/5Cyber Wargaming: Research and Education for Security in a Dangerous Digital World Rating: 0 out of 5 stars0 ratingsCryptography: A Very Short Introduction Rating: 5 out of 5 stars5/5Schneier on Security Rating: 4 out of 5 stars4/5Come and Take It: The Gun Printer's Guide to Thinking Free Rating: 5 out of 5 stars5/5Rise of the Water Margin: A Novel of the Near Future Rating: 5 out of 5 stars5/5
Computers For You
Business Intelligence For Dummies Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Cognitive Surplus: Creativity and Generosity in a Connected Age Rating: 4 out of 5 stars4/5Once Upon an Algorithm: How Stories Explain Computing Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Computational Thinking Rating: 4 out of 5 stars4/5Artificial Intelligence For Dummies Rating: 4 out of 5 stars4/5Bored and Brilliant: How Spacing Out Can Unlock Your Most Productive and Creative Self Rating: 4 out of 5 stars4/5Algorithms to Live By: The Computer Science of Human Decisions Rating: 4 out of 5 stars4/5Computer Science Beginners Crash Course: Coding Data, Python, Algorithms & Hacking Rating: 4 out of 5 stars4/5How to Work a Room: The Ultimate Guide to Savvy Socializing In Person and Online Rating: 3 out of 5 stars3/5The Emperor's New Mind: Concerning Computers, Minds, and the Laws of Physics Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Alone Together: Why We Expect More from Technology and Less from Each Other Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5The Art of Social Media: Power Tips for Power Users Rating: 4 out of 5 stars4/5Artificial Intelligence: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Elon Musk Rating: 5 out of 5 stars5/5Who's Afraid of AI?: Fear and Promise in the Age of Thinking Machines Rating: 5 out of 5 stars5/5T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power Rating: 4 out of 5 stars4/5The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5
Reviews for Summary of Scott J. Shapiro's Fancy Bear Goes Phishing
0 ratings0 reviews