Gratuit avec l'essai de 30 jours
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- Narrateur(s): Michael Reaves
- Durée: 3 h et 25 min
Échec de l'ajout au panier.
Échec de l'ajout à la liste d'envies.
Échec de la suppression de la liste d’envies.
Échec du suivi du balado
Ne plus suivre le balado a échoué
Acheter pour 18,74$
Aucun mode de paiement valide enregistré.
Nous sommes désolés. Nous ne pouvons vendre ce titre avec ce mode de paiement
Vous pourriez aussi aimer...
-
Computer Networking
- The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
- Auteur(s): Michael B. White
- Narrateur(s): Jim D. Johnston
- Durée: 10 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Technology has gradually transitioned from wired to wireless over the years with tons of benefits. From the internet of things to wireless communication, we are all witnesses of the huge benefits of wireless technologies. This audiobook covers various subjects and highlights both the benefits and challenges of wireless technologies.
Auteur(s): Michael B. White
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- Auteur(s): Quinn Kiser
- Narrateur(s): Ivan Busenius
- Durée: 7 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Very nice intro book!
- Écrit par Vince le 2021-05-12
Auteur(s): Quinn Kiser
-
Cybersecurity for Dummies
- Auteur(s): Joseph Steinberg
- Narrateur(s): BJ Harrison
- Durée: 13 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
Auteur(s): Joseph Steinberg
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Auteur(s): Lance Henderson
- Narrateur(s): James C. Lewis
- Durée: 12 h et 57 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Nothing about Kali Linux
- Écrit par Utilisateur anonyme le 2020-01-11
Auteur(s): Lance Henderson
-
Cybersecurity Essentials
- Auteur(s): Charles J. Brooks, Christopher Grow, Philip Craig, Autres
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Awful as an e-book
- Écrit par Mac le 2021-07-25
Auteur(s): Charles J. Brooks, Autres
-
The Pragmatic Programmer: 20th Anniversary Edition, 2nd Edition
- Your Journey to Mastery
- Auteur(s): David Thomas, Andrew Hunt
- Narrateur(s): Anna Katarina
- Durée: 9 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Dave Thomas and Andy Hunt wrote the first edition of this influential book in 1999 to help their clients create better software and rediscover the joy of coding. These lessons have helped a generation of programmers examine the very essence of software development. Now, 20 years later, this new edition re-examines what it means to be a modern programmer. Topics range from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse.
-
-
Great technical book, needs accompanying diagrams
- Écrit par Christine Y. le 2020-04-16
Auteur(s): David Thomas, Autres
-
Computer Networking
- The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
- Auteur(s): Michael B. White
- Narrateur(s): Jim D. Johnston
- Durée: 10 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Technology has gradually transitioned from wired to wireless over the years with tons of benefits. From the internet of things to wireless communication, we are all witnesses of the huge benefits of wireless technologies. This audiobook covers various subjects and highlights both the benefits and challenges of wireless technologies.
Auteur(s): Michael B. White
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- Auteur(s): Quinn Kiser
- Narrateur(s): Ivan Busenius
- Durée: 7 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Very nice intro book!
- Écrit par Vince le 2021-05-12
Auteur(s): Quinn Kiser
-
Cybersecurity for Dummies
- Auteur(s): Joseph Steinberg
- Narrateur(s): BJ Harrison
- Durée: 13 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
Auteur(s): Joseph Steinberg
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Auteur(s): Lance Henderson
- Narrateur(s): James C. Lewis
- Durée: 12 h et 57 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Nothing about Kali Linux
- Écrit par Utilisateur anonyme le 2020-01-11
Auteur(s): Lance Henderson
-
Cybersecurity Essentials
- Auteur(s): Charles J. Brooks, Christopher Grow, Philip Craig, Autres
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Awful as an e-book
- Écrit par Mac le 2021-07-25
Auteur(s): Charles J. Brooks, Autres
-
The Pragmatic Programmer: 20th Anniversary Edition, 2nd Edition
- Your Journey to Mastery
- Auteur(s): David Thomas, Andrew Hunt
- Narrateur(s): Anna Katarina
- Durée: 9 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Dave Thomas and Andy Hunt wrote the first edition of this influential book in 1999 to help their clients create better software and rediscover the joy of coding. These lessons have helped a generation of programmers examine the very essence of software development. Now, 20 years later, this new edition re-examines what it means to be a modern programmer. Topics range from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse.
-
-
Great technical book, needs accompanying diagrams
- Écrit par Christine Y. le 2020-04-16
Auteur(s): David Thomas, Autres
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- Auteur(s): Phillip L. Wylie, Kim Crawley
- Narrateur(s): Matthew Josdal
- Durée: 6 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
Auteur(s): Phillip L. Wylie, Autres
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Auteur(s): Kevin Mitnick
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- Écrit par Mr. C le 2018-02-27
Auteur(s): Kevin Mitnick
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Auteur(s): Nicole Perlroth
- Narrateur(s): Allyson Ryan
- Durée: 18 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- Écrit par Utilisateur anonyme le 2021-10-15
Auteur(s): Nicole Perlroth
-
Fundamentals of Software Architecture
- An Engineering Approach
- Auteur(s): Mark Richards, Neal Ford
- Narrateur(s): Benjamin Lange
- Durée: 13 h et 10 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book provides the first comprehensive overview of software architecture’s many aspects. Aspiring and existing architects alike will examine architectural characteristics, architectural patterns, component determination, diagramming and presenting architecture, evolutionary architecture, and many other topics. Mark Richards and Neal Ford—hands-on practitioners who have taught software architecture classes professionally for years—focus on architecture principles that apply across all technology stacks.
Auteur(s): Mark Richards, Autres
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
Auteur(s): Kim Zetter
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Okay
- Écrit par AmazonShopper le 2024-03-04
Auteur(s): Christopher Hadnagy
Description
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention....
Do you create tons of accounts you will never again visit?
Does your password contain a sequence of numbers, such as “123456”?
Do you automatically click all links and download all email attachments coming from your friends?
This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.
With this handy little book as your starting point, you can finally go from a starry-eyed internet user to a paranoid cybersecurity geek.
With plenty of examples, this audiobook will show you that the internet is not merely a way to watch cute cat videos; it's a battlefield, a military invention that was accidentally found to be capable of overpowering any threat economically, digitally and politically.
From the crudest forums to the most sophisticated online services, there is a war going on, and, whether you want it or not, you're involved by the very fact you're here, so better arm yourself with knowledge.
Here’s just a tiny fraction of what you’ll discover:
- How the internet is held together with a pinky swear
- How hackers use raunchy photos to eke out private information
- Examples of preposterous social engineering attacks
- Equally preposterous defense from those attacks
- How people in charge don't even realize what hacking means
- How there's only one surefire way to protect against hacking
- Research on past, present, and future hacking methods
- Difference between good and bad hackers
- How to lower your exposure to hacking
- Why companies pester you to attach a phone number to an account
- Why social media is the most insecure way to spend your afternoon
And much, much more....
D'autres livres audio du même...
Ce que les auditeurs disent de Cybersecurity
Moyenne des évaluations de clientsÉvaluations – Cliquez sur les onglets pour changer la source des évaluations.
-
Au global
-
Performance
-
Histoire
- Kelly H
- 2021-10-28
Absolutely Amazing for my first audiobook
After listening to this front to back, I really appreciate the authors use of strong analogies to explain certain topics. I also am very entertained by the sheer amount of real life stories as well as solutions to most of them. The unbiased opinions also made me very intrigued into listening to this. 5 Star for sure.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.