Stories from the Frontlines of the Global Cyberwar Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, "deepfake" videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most…mehr
Stories from the Frontlines of the Global Cyberwar Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, "deepfake" videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late.
Theresa M. Payton served as the first female Chief Information Officer for the White House during the President George W. Bush administration and is currently CEO and founder of Fortalice Solutions, a boutique cybersecurity and intelligence services company that's listed in the Global Cybersecurity Top 500. She starred as the Deputy Commander of Intelligence on the CBS TV series, Hunted, is a frequent guest on national and international news outlets, and is featured in the book of "100 Fascinating Females Fighting Cybercrime." Among her many accolades are the FBI Director's award for community service. She has co-authored two other books with Ted Claypoole.
Inhaltsangabe
Contents Prologue Introduction Chapter 1: How Did We Get Here? Chapter 2: Motives & Targets: Manipulation in a Post-Truth, Post-Trust Era Chapter 3: How Do You Know What You Think You Know? Chapter 4: The Manipulators and Their Methods Chapter 5: Hackers in the Trenches Chapter 6: Exclusive Interview: Anatomy of a Manipulation Campaign Chapter 7: The U.S. Elections 2016-2018 Chapter 8: America Isn't the Only Target Chapter 9: The Next Target: What Attacks Can We Expect in 2020 and Beyond? Chapter 10: Your Worst Nightmare: The Death of Democracy Chapter 11: What Can You Do? Author's Note About the Author
Contents Prologue Introduction Chapter 1: How Did We Get Here? Chapter 2: Motives & Targets: Manipulation in a Post-Truth, Post-Trust Era Chapter 3: How Do You Know What You Think You Know? Chapter 4: The Manipulators and Their Methods Chapter 5: Hackers in the Trenches Chapter 6: Exclusive Interview: Anatomy of a Manipulation Campaign Chapter 7: The U.S. Elections 2016-2018 Chapter 8: America Isn't the Only Target Chapter 9: The Next Target: What Attacks Can We Expect in 2020 and Beyond? Chapter 10: Your Worst Nightmare: The Death of Democracy Chapter 11: What Can You Do? Author's Note About the Author
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826