Physical
In CirculationReal-Life Cybersecurity Breach Incidents: Discusses real-world cases of cyber espionage and data theft, providing insights into the methods and motives of cyber attackers.
Impact of Data Breaches: Explores the consequences and impacts of data breaches on individuals, organizations, and national security.
Cyber Threat Landscape: Provides an overview of the evolving cyber threat landscape, including various tactics and techniques used by hackers and cybercriminals.
Security Measures and Prevention Strategies: Discusses cybersecurity best practices and strategies for preventing data breaches and enhancing digital security.
Corporate Espionage and Insider Threats: Explores the risks posed by insider threats and corporate espionage, shedding light on challenges in safeguarding sensitive information.
Government Surveillance and Cyber Warfare: Addresses the role of government surveillance, cyber warfare, and intelligence agencies in cybersecurity efforts.
Ethical and Legal Implications: Discusses the ethical dilemmas and legal ramifications associated with cybersecurity, privacy, and data protection.
Global Cybersecurity Challenges: Explores global cybersecurity challenges and international efforts to combat cyber threats and protect sensitive information.
Technological Innovations and Security: Highlights emerging technologies and innovations aimed at bolstering cybersecurity measures and defending against cyber attacks.
Lessons Learned and Future Trends: Extracts lessons from past breaches and predicts future trends in cybersecurity, offering insights for better preparedness.
Language | English |
---|---|
ISBN-10 | 9780143426318 |
ISBN-13 | 9780143426318 |
No of pages | 234 |
Font Size | Medium |
Book Publisher | Penguin Portfolio |
Published Date | 10 Jan 2018 |
© 2024 Dharya Information Private Limited
A journalist accused of hacking the inbox of a billionaire
A company which fought back when its data was stolen
An entrepreneur who fought an international battle to end piracy
A hacker who decided to take a start-up hostage by stealing its data
Full of riveting stories of hackers, police and corporates, Breach reads like a thriller. The book brings to light several incidents which till now were brushed under the carpet. It has instances of piracy, data theft, phishing, among many others.
Even though he focuses on India, Nirmal John takes great pains to show links between underground international networks working to undermine data security.