<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hackers: Heroes of the Computer Revolution &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/hackers-heroes-of-the-computer-revolution/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 23 May 2020 19:30:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Hackers: Heroes of the Computer Revolution &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>These are the top 5 must-read cybersecurity books</title>
		<link>https://risk-academy.ru/these-are-the-top-5-must-read-cybersecurity-books/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 23 May 2020 19:30:20 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Personal life]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Human behavior]]></category>
		<category><![CDATA[Marcus Carey]]></category>
		<category><![CDATA[Timothy Ferriss]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[Jennifer Jin]]></category>
		<category><![CDATA[Hackers: Heroes of the Computer Revolution]]></category>
		<category><![CDATA[Hacker culture]]></category>
		<category><![CDATA[Security hacker]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/these-are-the-top-5-must-read-cybersecurity-books/</guid>

					<description><![CDATA[Hackers and cyber-criminals improve their tactics every day. As a consequence, the cybersecurity industry must perpetually adapt to stay ahead of malicious actors. Verizon points out in its 2019 Data [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="article-body">
<p>Hackers and cyber-criminals improve their tactics every day. As a consequence, the cybersecurity industry must perpetually adapt to stay ahead of malicious actors. Verizon points out in its <u>2019 Data Breach Investigations Report</u>, which is based on 42,000 recorded incidents, that the best defense against cybercrime is knowledge. Unless organizations understand the digital threats they face, they will be powerless to stop them. </p>
<p>Whether you are simply reading for pleasure or hoping to protect yourself by improving your cybersecurity knowledge, there’s no better place to turn to understand the nuances of information security than a good book. </p>
<aside class="hawk-widget" data-render-type="fte" data-skip="dealsy" data-widget-type="seasonal"/>
<p>To help you find the most informative, engaging, and up-to-date works published on cybersecurity, we put together the list below. These are the top 5 must-read cybersecurity books to pick up in 2020.</p>
<h2 id="1-tribe-of-hackers-cybersecurity-advice-from-the-best-hackers-in-the-world-xa0">1. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World </h2>
<figure data-bordeaux-image-check="">
<p class="vanilla-image-block"><picture><source type="image/webp" alt="Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World" class=" lazy-image-van optional-image" onerror="if(this.src &amp;&amp; this.src.indexOf('missing-image.svg') !== -1){return true;};this.parentNode.replaceChild(window.missingImage(),this)" sizes="(min-width: 1000px) 602px, calc(100vw - 40px)" data-normal="https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg" data-srcset="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-320-80.jpg.webp 320w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-650-80.jpg.webp 650w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-970-80.jpg.webp 970w" data-original-mos="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg" data-pin-media="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg"/><source type="image/jpeg" alt="Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World" class=" lazy-image-van optional-image" onerror="if(this.src &amp;&amp; this.src.indexOf('missing-image.svg') !== -1){return true;};this.parentNode.replaceChild(window.missingImage(),this)" sizes="(min-width: 1000px) 602px, calc(100vw - 40px)" data-normal="https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg" data-srcset="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-320-80.jpg 320w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-650-80.jpg 650w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-970-80.jpg 970w" data-original-mos="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg" data-pin-media="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg"/><img decoding="async" title="Articles" src="https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg" alt="Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World" class=" lazy-image-van optional-image" onerror="if(this.src &amp;&amp; this.src.indexOf('missing-image.svg') !== -1){return true;};this.parentNode.replaceChild(window.missingImage(),this)" sizes="(min-width: 1000px) 602px, calc(100vw - 40px)" data-normal="https://vanilla.futurecdn.net/techradar/media/img/missing-image.svg" data-srcset="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-320-80.jpg 320w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-650-80.jpg 650w, https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4-970-80.jpg 970w" data-original-mos="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg" data-pin-media="https://cdn.mos.cms.futurecdn.net/mps9oyGgJSX2hJbQMp5mF4.jpg"/></picture><figcaption itemprop="caption description"><span class="caption-text">T<em>ribe of Hackers will address any misconceptions you hold about cybersecurity. </em> </span><span class="credit" itemprop="copyrightHolder">(Image credit: Future)</span></figcaption></figure>
<p>Marcus Carey was inspired to write <em>Tribe of Hackers</em> after listening to Timothy Ferriss’s <em>Tribe of Mentors</em>. He and Jennifer Jin put together 14 questions, starting&#8230;</p>
</div>
<p><a href="https://www.techradar.com/in/news/these-are-the-top-5-must-read-cybersecurity-books">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
