|
![]() |
|||
|
||||
OverviewA transformative new approach to Internet security from an experienced industry expert Taming the Hacking Storm: A Framework for Defeating Hackers and Malware is a groundbreaking new roadmap to solving the ubiquitous Internet security issues currently plaguing countries, businesses, and individuals around the world. In easy-to-understand and non-technical language, author and cybersecurity veteran Roger Grimes describes the most prevalent threats to our online safety today and what ties them all together. He goes on to lay out a comprehensive and robust framework for combating that threat—one that rests on a foundation of identity verification—and explains exactly how to implement it in the real world. The author addresses each of the challenges, pitfalls, and roadblocks that might stand in the way of his solutions, offering practical ways to navigate, avoid, or counter those impediments. The book also includes: How to address peripheral security issues, including software and firmware vulnerabilities Strategies for addressing a lack of international agreement on the implementation of security standards and practices Things you can do today to encourage the development of a more secure, trusted Internet An insightful and original new approach to cybersecurity that promises to transform the way we all use the Internet, Taming the Hacking Storm is a must-read guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy. Full Product DetailsAuthor: Roger A. Grimes (KnowBe4)Publisher: John Wiley & Sons Inc Imprint: John Wiley & Sons Inc Dimensions: Width: 18.50cm , Height: 2.80cm , Length: 23.10cm Weight: 0.499kg ISBN: 9781394349586ISBN 10: 1394349580 Pages: 336 Publication Date: 17 April 2025 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsTable of Contents About the Author Preface About This Book Acknowledgments Chapter Summaries Part I: Identifying the Problem Chapter 1: How Bad Is Internet Security? Chapter 2: How We Are Attacked and Why Chapter 3: The Problem Chapter 4: Challenges Part II: The Technology Solution Chapter 5: The Solution Chapter 6: Technology Solution Summary Chapter 7: Trusted Identity Chapter 8: Safe and Trusted Devices Chapter 9: Trusted OS and Apps Chapter 10: Trusted Networks Chapter 11: Trust Assurance Service Chapter 12: Internet Security Global Alliance Part III: Challenging the Solution Chapter 13: Threat Modeling Chapter 14: Common Questions Part IV: Other Needed Solutions Chapter 15: Secure Coding Chapter 16: Better Patching Chapter 17: Getting International Agreements Chapter 18: What You Can Do IndexReviewsAuthor InformationROGER A. GRIMES is a technical author and computer security veteran with 36 years’ experience in the IT industry. He is the Data-Driven Defense Evangelist at KnowBe4, a human risk management company, as well as a senior computer security consultant and cybersecurity architect. He specializes in hackers, malware, identity management, Windows computer security, host security, and quantum computing. Tab Content 6Author Website:Countries AvailableAll regions |