• Complain

Max Nomad - Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people

Here you can read online Max Nomad - Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2014, publisher: Bohemian Griot Publishing, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Max Nomad Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people
  • Book:
    Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people
  • Author:
  • Publisher:
    Bohemian Griot Publishing
  • Genre:
  • Year:
    2014
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Computers are wonderful... and they can be just as dangerous. Every day millions of people become the victims of Identity Theft, their computers hacked or infected. In most cases zombies are involved. Zombies - what our computers turn into once they get malware infected and cybercriminals have secretly gained control. They steal our information, credit cards and bank accounts. They feed on our identities. [This] is an armchair safari into the world of cybercrime. The focus is basic information security and online safety, told with a little zombie-fan fun ... you will: read first-hand accounts of how credit card thieves, hackers and predators operate; learn what computer manufacturers have never bothered to tell buyers; learn ways to better protect your home and office from viruses, data theft, phishing and fraud, ...and much more. Written for novice PC and Mac users, if youre able to check email and click around on the web (and like zombie stories) this book is for you--Publishers description. Read more...
Abstract: Computers are wonderful... and they can be just as dangerous. Every day millions of people become the victims of Identity Theft, their computers hacked or infected. In most cases zombies are involved. Zombies - what our computers turn into once they get malware infected and cybercriminals have secretly gained control. They steal our information, credit cards and bank accounts. They feed on our identities. [This] is an armchair safari into the world of cybercrime. The focus is basic information security and online safety, told with a little zombie-fan fun ... you will: read first-hand accounts of how credit card thieves, hackers and predators operate; learn what computer manufacturers have never bothered to tell buyers; learn ways to better protect your home and office from viruses, data theft, phishing and fraud, ...and much more. Written for novice PC and Mac users, if youre able to check email and click around on the web (and like zombie stories) this book is for you--Publishers description

Max Nomad: author's other books


Who wrote Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people? Find out the surname, the name of the author of the book and a list of all author's works by series.

Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
wwwbgpublishingcom Copyright 2014 by Max Nomad All rights reserved No part - photo 1
wwwbgpublishingcom Copyright 2014 by Max Nomad All rights reserved No part - photo 2

www.bgpublishing.com

Copyright 2014 by Max Nomad, All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by an information storage and retrieval systemexcept by a reviewer who may quote brief passages in a review to be printed in a magazine, newspaper, or websitewithout permission in writing from the publisher.

The designations used by corporations to distinguish their products and services are their own trademarks. Where those designations are used in this book (and the publisher is aware of the trademark) the designations shall be noted with initial capital letters or all caps.

The author, publisher, and production affiliates have spent months preparing this book but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.

For more information please visit: www.bgpublishing.com

Graphic Design (Book Cover, Illustrations and Layout)
by Max Nomad

Index by John Cullenton, Able Indexers and Typesetters

Reaching Zombie (image repeated on computer screens on front cover) provided by Izzy Gramp, www.shrubber.com.au

ISBN: 978-0-9715442-9-1 (Print)

ISBN: 978 -0-9715442-8-4 (EPUB)

LCCN: 2013957049

Printed in the United States of America.

First printing . Fall, 2014

This book is dedicated to anyone that ever lost something special to criminals - photo 3

This book is dedicated to anyone that ever lost something special to criminals - photo 4

This book is dedicated to anyone that ever lost
something special to criminals and zombies
and wants to make sure it doesnt happen again.

Foreword

by Keith Basil

It was around 1991 that I had settled into college life as a Computer Science major in the southeastern Virginia area. As a brash hacker new to the area code, my first order of business was to find out who was who in the local underground. After a few months of surveying the local network, one name kept coming upMax Nomad. Messages like Max Nomad is the guy you want to get in touch with, Max Nomad has that type of information and Max Nomad was here a few days ago were replaying on the top underground systems at the time. Max Nomad was larger than life, apparently. I finally met Max Nomad... and as fate would have it, we were on the same campus.

And so our crazy journey began.

Max and I were two of the co-founders of the Internet Service Provider mentioned in this book. With the new venture, all underground activities were put away and becoming Mad Hackers Bent on Corporate Plunder was our new mission. We opened up shop Friday, June , 1994 in the World Trade Center in downtown Norfolk, Virginia.

So imagine if you will, taking a short break from the insanity of running a startup. Sitting on the couch in our reception area and looking across the posh lobby at the signage of a fellow commercial tenant, a few questions came to mind. Why do I know that name? Why is this familiar? And then, it hit me. I recognized the company name not for the services they provided but for what type of system they ran. Years earlier, I had hacked into their system, stayed around a few days, noted the system users and left without a trace. Can you imagine my surprise when the system administrator came over to chat about our new startup and our cool black NeXT computers? She introduced herself as Pat. With a smirk I replied Yes, I knowluckily she didnt catch the inference. We chatted about each others systems for a whilehackers, in the truest sense of the word, one to another. All was well and after she left Max and I had yet another story for the archives.

Why is this story relevant? Two reasons: That moment in the reception area, talking to Pat marked a transitional period for us. It represented a move from offense to defense. Just like Pat, we were now responsible for running production systems critical to the success of the business. Its a direct point of reflection and relevance for this book because here in your hands is a work written by someone who has seen and been on both sides of the fence.

You will not find a better perspective.

As society becomes more technologically complex, the bugs, loopholes, and defaults will exist and the underground will thrive. Whether the masses choose to acknowledge this or not, we are a subculture of and to ourselves, much like the Grateful Dead followers. Some will move on, die off, or fade away, and others will stream in to fill the empty spaces.

Addressing the computer underground, Max wrote those words over two decades ago for a popular hacker magazine. That passage still holds true todaythe empty spaces will always be filled. The nefarious nature of the threats and bad actors have continued to evolve... and Max has as well. The work presented in this book will educate, entertain and most important help keep you, your information and your computers a bit safer.

Picture 5

Keith Basil is a serial entrepreneur, inventor and technology executive, with over years of experience related to Internet services, startups, funding, security, and cloud architecture. Most recently as a Red Hat executive, he is focused on OpenStack product management, development and strategy with emphasis on elastic cloud management and security. He has also worked with members of the OpenStack community to co-author the first edition of the OpenStack Security Guide. His past experience includes managing two startups (where he raised several rounds of capital), and working as a senior consultant at Cisco Systems where he holds two patents in the areas of unified messaging and application development. He has also been an expert witness and member of the legal defense teams of Amazon and Ebay.

Keith can be reached through his personal website www.noslzzp.com.

Disclaimer

This book is presented solely for educational and entertainment purposes. It is not intended as a substitute for computer manuals, the advice of IT professionals, or professional IT services. While best efforts have been used to verify the accuracy of all information presented in this book, the author and publisher make no representations or warranties of any kind and assume no liabilities of any kind with respect to the accuracy or completeness of the contents and specifically disclaim any implied warranties of merchantability or fitness of use for a particular purpose. Neither the author nor the publisher shall be held liable or responsible to any person or entity with respect to any loss or incidental or consequential damages caused, or alleged to have been caused, directly or indirectly, by the information or programs contained herein. No warranty may be created or extended by sales representatives or written sales materials. Every company is different and the advice and strategies contained herein may not be suitable for your situation. You should seek the services of a competent IT professional before beginning any major security improvements to your home or office network.

Unless stated otherwise, the events and scenarios described in the authors personal anecdotes are based on real events. Names (and some descriptions) have been changed or omitted to maintain client anonymity. In some cases the genders, ethnicity, or professions have been changed or omitted unless they are pertinent to the story.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people»

Look at similar books to Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people»

Discussion, reviews of the book Surviving the zombie apocalypse: safer computing tips for small business managers & everyday people and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.