Explore the latest books of this year!
Bookbot

Jessica Barker

    Hacked
    Confident Cyber Security
    Cybersecurity ABCs
    Stone Fidelity
    • Stone Fidelity

      Marriage and Emotion in Medieval Tomb Sculpture

      • 354 pages
      • 13 hours of reading

      This book offers a groundbreaking exploration of the "double tomb" effigies from the Middle Ages, analyzing their significance and cultural implications. It delves into the artistic and historical context of these unique monuments, shedding light on the relationships they commemorate and the societal values they reflect. Through detailed examination, the author reveals how these effigies served not only as memorials but also as expressions of identity and status during a transformative period in history.

      Stone Fidelity
    • Cybersecurity problems don't always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness, behaviour and culture change (ABCs). This book guides organisations looking to create an enhanced security culture through improved understanding and practice of cybersecurity at an individual level.

      Cybersecurity ABCs
    • Uncover the basic principles of cyber security and futureproof your career with this easy-to-understand, jargon-busting beginner's guide to the practical skills you need.

      Confident Cyber Security
    • When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats. Hacked offers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target. Featuring expert commentary from world-leading cybersecurity experts and ethical hackers, this book uncovers the fascinating stories of the most insidious and notorious cyber attacks, including how the Mirai malware almost took down the internet and how a supply chain attack infiltrated the US government and other global institutions. From social engineering and data theft to ransomware and Distributed Denial-of-Service (DDoS) attacks, there are numerous strategies that hackers use to target our finances and data. Uncover their secrets and learn how to safeguard your data with Hacked.

      Hacked