About the book:
What starts out as a calm night in Salt Lake City turns into chaos
when a passenger plane crashes into the mountains. When reformed cyber
hacker Tanner Stone links the accident to an ingenious Chinese computer
virus, it’s up to him to prevent it from destroying the financial data
of everyone in America! Thrilling, explosive, and packed with twists,
this book changes everything you know about Internet security.
About the author:
Few people understand the terrifying, yet realistic threat of
computer hacking like Denver Acey. Denver has spent his entire
professional career in the information technology industry where he has
witnessed and even thwarted actual cybercrime. From his top-secret job
working for the US government to securing computer networks at Fortune
500 companies, Denver is personally familiar with hackers and their
unscrupulous activities.
But over the years, Denver has become increasingly frustrated with
Hollywood’s inaccurate portrayal of cybercrime. Hackers are more
intelligent and more sophisticated than simple teenagers, who guzzle
down Mountain Dew while playing video games. Cybercrime is a
billion-dollar business that encompasses organized crime and foreign
governments. For these elite hackers, the fruits of success are iconic
trademarks, innovative patents, and government secrets.
Because of his unique background, Denver decided to write a book to
dispel hacking myths while highlighting the tenacity of cybercriminals.
Utilizing actual computer hacking concepts and scenarios that he has
experienced firsthand, Denver illustrates — in a simple way for even the
non-techie to understand — how vulnerable we all are to cybercrime.
FROM REIDHEAD RANDOMNESS (guest post from Mr. Randomness):
Now I have to go back and read quantum breach, the
first book in the two book series. This was a fun read. Quantum
deception is based in the same area that I live. Now I'll never be able
to look at the NSA data complex the same. I'll always be wondering
what capabilities they REALLY have for identifying terrorist threats.
As a fan of internet security and any and all technology, this was a
fairly fast read with enough factual information to make it seem
reasonably plausible. The target audience for this book would probably
be adults with an interest in cyber security.
skip to main |
skip to sidebar
facebook
Wednesday, April 8, 2015
Contributors
Popular Posts
-
I got this super cute idea from Little LDS ideas . The direct link to the "Scripture Bowl" idea is HERE. This is my version of ...
-
Last month for Primary we had a Medieval Feast. We had everyone come dressed as a king, prince, knight, princess, queen, etc. One of m...
-
Oooh baby! Purex has just come out with a new line of laundry soap. It is specially designed for babies. It has the same great cleanin...
-
About the book: When Gideon, a former missionary, discovers a mysterious drawing tucked in an ancient journal he returns to Jamaica with...
-
Places to See Christmas Lights in Utah I’ve started a list of Christmas light displays around the state. Hopefully some of your can help ...
Blog Archive
-
▼
2015
(99)
-
▼
April
(11)
- FUN at Fat Cats in Salt Lake City!
- Review: Stranded
- WANNA WIN A FREE COLOR RUN in SLC, UT
- Review: Base Hits and Home Run Relationships
- Review: The Magical Slow Cooker
- Review: Have Gavel Will Travel
- Review: A Mother's Greatest Gift
- Review: Party with Sweet Treats
- Review: The Quantum Deception
- Review: Daily Tortilla
- GIVEAWAY! Win a FREE Color RUN Salt Lake City cod...
-
▼
April
(11)
0 comments:
Post a Comment
If you can't leave a comment, try using another browser. Sorry for the inconvenience! Sometimes firefox won't work.