Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between
As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power grid can be manipulated or sabotaged by terrorists.

But knowledge is power. In this easy-to-read, fascinating and fully illustrated book, you learn how hackers make money, and what they target - along with concrete, hands-on hints for fighting back, whether you’re a concerned parent or a top executive.

Packaged in a durable, wipe-clean flexicover with metallic corner-guards, this practical manual withstands heavy-duty use indoors and out.


With all the surrounding threats, what better person to prepare the public, than a team of internationally known cybersecurity experts? Nick Selby is a police detective specializing in sharing intelligence and busting cybercriminals. He knows how these crimes happen, who does them, and how to make your life safer. In The Cyber Attack Survival Manual he and a veritable brain trust of experts from the world of intelligence, digital currency, vehicle-hacking, and sophisticated crimeware, share the best techniques for everyone.

This indispensable, step-by-step guide to cyber defense includes:

Everyday security: How to keep your identity from being stolen, protect your kids, protect your cards and much more.

Big Stories: Silk Road, Ashley Madison, FBI vs. Apple, WikiLeaks, BitCoins, and what they mean to individuals and society at large.

Global issues: the NSA, how hackers can crash your car, and is China really planning to crash Google?

Crucial to surviving the worst the Internet can throw at you, The Cyber Attack Survival Manual is the must-have book of the 21st century. Think you don’t need this book because, “I have nothing to hide”? Selby and Vescent, along with Eric Olson, Moeed Siddiui, and John Bear, show you why you’re wrong (everyone now has something to hide) - and how lack of security can endanger your finances, your safety, and your reputation.
1126431500
Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between
As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power grid can be manipulated or sabotaged by terrorists.

But knowledge is power. In this easy-to-read, fascinating and fully illustrated book, you learn how hackers make money, and what they target - along with concrete, hands-on hints for fighting back, whether you’re a concerned parent or a top executive.

Packaged in a durable, wipe-clean flexicover with metallic corner-guards, this practical manual withstands heavy-duty use indoors and out.


With all the surrounding threats, what better person to prepare the public, than a team of internationally known cybersecurity experts? Nick Selby is a police detective specializing in sharing intelligence and busting cybercriminals. He knows how these crimes happen, who does them, and how to make your life safer. In The Cyber Attack Survival Manual he and a veritable brain trust of experts from the world of intelligence, digital currency, vehicle-hacking, and sophisticated crimeware, share the best techniques for everyone.

This indispensable, step-by-step guide to cyber defense includes:

Everyday security: How to keep your identity from being stolen, protect your kids, protect your cards and much more.

Big Stories: Silk Road, Ashley Madison, FBI vs. Apple, WikiLeaks, BitCoins, and what they mean to individuals and society at large.

Global issues: the NSA, how hackers can crash your car, and is China really planning to crash Google?

Crucial to surviving the worst the Internet can throw at you, The Cyber Attack Survival Manual is the must-have book of the 21st century. Think you don’t need this book because, “I have nothing to hide”? Selby and Vescent, along with Eric Olson, Moeed Siddiui, and John Bear, show you why you’re wrong (everyone now has something to hide) - and how lack of security can endanger your finances, your safety, and your reputation.
29.0 In Stock
Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between

Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between

Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between

Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between

$29.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
    Not Eligible for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power grid can be manipulated or sabotaged by terrorists.

But knowledge is power. In this easy-to-read, fascinating and fully illustrated book, you learn how hackers make money, and what they target - along with concrete, hands-on hints for fighting back, whether you’re a concerned parent or a top executive.

Packaged in a durable, wipe-clean flexicover with metallic corner-guards, this practical manual withstands heavy-duty use indoors and out.


With all the surrounding threats, what better person to prepare the public, than a team of internationally known cybersecurity experts? Nick Selby is a police detective specializing in sharing intelligence and busting cybercriminals. He knows how these crimes happen, who does them, and how to make your life safer. In The Cyber Attack Survival Manual he and a veritable brain trust of experts from the world of intelligence, digital currency, vehicle-hacking, and sophisticated crimeware, share the best techniques for everyone.

This indispensable, step-by-step guide to cyber defense includes:

Everyday security: How to keep your identity from being stolen, protect your kids, protect your cards and much more.

Big Stories: Silk Road, Ashley Madison, FBI vs. Apple, WikiLeaks, BitCoins, and what they mean to individuals and society at large.

Global issues: the NSA, how hackers can crash your car, and is China really planning to crash Google?

Crucial to surviving the worst the Internet can throw at you, The Cyber Attack Survival Manual is the must-have book of the 21st century. Think you don’t need this book because, “I have nothing to hide”? Selby and Vescent, along with Eric Olson, Moeed Siddiui, and John Bear, show you why you’re wrong (everyone now has something to hide) - and how lack of security can endanger your finances, your safety, and your reputation.

Product Details

ISBN-13: 9781681881751
Publisher: Weldon Owen
Publication date: 10/10/2017
Pages: 224
Product dimensions: 10.90(w) x 16.40(h) x 4.80(d)

About the Author

Nick Selby has nearly 20 years of cyber security and intelligence experience, and is a currently a police detective and cyber security consultant. He is the co-founder of StreetCred Software, Inc. which creates software and services that help police agencies, courts, and cities access, rank, understand, and use a vast range of data. He appears frequently in media including the New York Times, Washington Post, CNN, NPR, and Fox News discussing online security, terrorism, and more. His latest book is In Context: Understanding Police Killings of Unarmed Civilians (CIAI/Calibre Press). Nick is also co-author of Blackhatonomics: An Inside Look at the Economics of Cybercrime (Syngress) and was technical editor of Investigating Internet Crimes (Syngress)

Heather Vescent is a social scientist who studies future trends to help people understand and take advantage of change. She does this through speaking, consulting, research projects, design fictions, and media productions. Her company, The Purple Tornado, has been around since 2006. Prior to The Purple Tornado, she helped build and launch more than 50 Internet products at over 30 startups from 1996 to the 2005 in Silicon Valley and Los Angeles. Recently, Heather completed an assignment with the Swift Innovation Team, Innotribe, based in New York, NY and La Hulpe, Brussels. She is best known for her research on the Future of Transactions, which she presented at SxSW, Sibos, TedxZwolle, The Future of Money,Tomorrow's Transactions and other conferences around the world. She is the producer and creator of 4 short films, including “Fly Me to the Moon;” nominated for the Most Important Futures Award by the Association of Professional Futurists, 2012; “Flowers for Grandma;” “Innotribe Startup Challenge Documentary," and “Slices of Life.”

Read an Excerpt

DIGITAL SAFEKEEPING In the future, we won’t get to simply stash our cash in a safe or under a mattress. New forms of finance mean new protocols for keeping your money safe.
 
Keeping Online Integrity While many governments offer individual reimbursements from fraud, business accounts are not always guaranteed the same security, and online banking and fraud protection are not typically in the hands of the user. Look for financial institutions that have good security—sometimes it’s hard to find out which ones have been hacked, because no one wants to disclose that information. Use robust passwords in online banking, change them often, and don’t reuse old passwords. Limit who you share banking authentication credentials with to reduce the chance
of unauthorized transfers or transactions.
 
Stay Secure with a Selfie Banks are motivated to use secure systems. Passwords can be difficult to enter on a mobile device, so banks have other secure authentication systems options: your fingerprint, a PIN, or facial (or even voice) recognition. The secure selfie is even hacker proof—you must blink or make a facial gesture that you can’t duplicate with a photograph.
 
Be Safer with Biometrics Biometric verification has been thought of as the great fail-safe. The idea is that it’s near impossible to replicate someone’s fingerprint or iris or retina, although hackers (and Hollywood) have shown ways to duplicate a fingerprint. Unlike a password reset, it’s not that easy to get a new fingertip or eye. There are, however, security combinations that use hashed biometric data for three-factor (adding a biometric to the password and token) or even four-factor identity verification involving a second biometric. The more factors that are required for a transaction, the harder it is for a thief to steal or replicate them.
 
Practice Credit Control Use multiple credit accounts. The first is for automatic monthly payments; the second (with a low limit) for spontaneous online purchases and the like (this number can be virtual, or even single use, so you have to get new ones each time you want to use the account); and a third for physical shopping, with a slightly higher credit limit. Monitor your credit score. You’ll know if there is a change in your score and be empowered to fix it. Check your bank accounts on a regular basis via a dashboard or phone app, and set up notification for certain transactions and amounts. Tell your bank or credit company when you are traveling so it will allow your purchases. Know your bank’s customer service numbers and how to stop payments or authorize a charge on your mobile app.
 

From the B&N Reads Blog

Customer Reviews