Computer Hackers
-
-
The Future of Violence
- Robots and Germs, Hackers and Drones - Confronting a New Age of Threat
- Auteur(s): Benjamin Wittes, Gabriella Blum
- Narrateur(s): Tom Weiner
- Durée: 11 h et 54 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
From drone warfare in the Middle East to digital spying by the National Security Agency, the US government has harnessed the power of cutting-edge technology to awesome effect. But what happens when ordinary people have the same tools at their fingertips? Advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to potentially dangerous technologies that could be used to attack states and private citizens alike.
-
The Future of Violence
- Robots and Germs, Hackers and Drones - Confronting a New Age of Threat
- Narrateur(s): Tom Weiner
- Durée: 11 h et 54 min
- Date de publication: 2015-03-10
- Langue: Anglais
- From drone warfare in the Middle East to digital spying by the National Security Agency, the US government has harnessed the power of cutting-edge technology to awesome effect....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,50 $ ou gratuit avec l'essai de 30 jours
-
-
-
Alias Fortezza
- A Hacker's Odyssey
- Auteur(s): David Schrooten, Freke Vuijst
- Narrateur(s): Boris Hiestand, Freke Vuijst
- Durée: 14 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2012, 21-year-old Dutch hacker David Schrooten was living at his parents’ house in the Netherlands and spending most of his time online. When he wasn’t squabbling with fellow hackers, he was making plans to visit his Romanian girlfriend. His life turned upside-down when Interpol agents arrested him at an airport in Romania on international hacking charges involving $63 million in damages. Soon Schrooten found himself extradited to the United States, a country where he had never been before.
-
-
Good Story. I don't agree with portrayal
- Écrit par James le 2019-07-10
-
Alias Fortezza
- A Hacker's Odyssey
- Narrateur(s): Boris Hiestand, Freke Vuijst
- Durée: 14 h et 30 min
- Date de publication: 2019-02-28
- Langue: Anglais
-
In 2012, 21-year-old Dutch hacker David Schrooten's life turned upside-down when Interpol agents arrested him on international hacking charges involving $63 million in damages. Soon Schrooten found himself extradited to the United States, a country where he had never been before....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
43,80 $ ou gratuit avec l'essai de 30 jours
-
-
-
Takeover
- Auteur(s): Fritjof Karnani
- Narrateur(s): Manuel Kressin
- Durée: 6 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ferry Ranco hat als Computerexperte ein internationales Internet-Unternehmen aufgebaut. Als Hacker in das System des Bundeskanzleramtes einzudringen versuchen, sieht er sein Lebenswerk bedroht...
-
Takeover
- Narrateur(s): Manuel Kressin
- Durée: 6 h et 35 min
- Date de publication: 2010-03-04
- Langue: Allemand
- Ferry Ranco hat als Computerexperte ein internationales Internet-Unternehmen aufgebaut. Als Hacker in das System des Bundeskanzleramtes einzudringen versuchen, sieht er sein Lebenswerk bedroht...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,15 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Unlocked!
- Strategies to Outsmart Hackers, and Online Criminals
- Auteur(s): Miles Lockhart
- Narrateur(s): Lloyd V Dennis
- Durée: 5 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Go from cyber-insecure to cyber-savvy—outsmart cyber thieves with this comprehensive guide to a safe, fulfilling online experience—even if online safety is uncharted territory for you! Just 10 years ago, few people could probably envision a world where they could shop with their mobile phone, effortlessly connect their home and work computers, or access literally millions of apps with just one click. The upside of ubiquitous connectivity? Speed, practicality, efficiency. The downside? Data has become gold, and our “treasure” is sadly all too accessible to clever hackers and data thieves.
-
Cybersecurity Unlocked!
- Strategies to Outsmart Hackers, and Online Criminals
- Narrateur(s): Lloyd V Dennis
- Durée: 5 h et 5 min
- Date de publication: 2025-01-13
- Langue: Anglais
-
Go from cyber-insecure to cyber-savvy—outsmart cyber thieves with this comprehensive guide to a safe, fulfilling online experience—even if online safety is uncharted territory for you!
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Insider Secrets to Internet Safety
- Advice from a Professional Hacker
- Auteur(s): Terry Cutler
- Narrateur(s): Kaleo Griffith
- Durée: 4 h et 10 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In a world of digital technology, it’s easy to forget one sobering fact: Our identity can be stolen from under our noses, with one click of the mouse, propelling us into nightmares in a matter of minutes, anytime, anywhere, and on any one of our darling gadgets. Cybercrimes, malware, botnets, and all forms of digital threats are ever more sophisticated, waiting in the shadows for that one opportunity to steal your sensitive information.
-
Insider Secrets to Internet Safety
- Advice from a Professional Hacker
- Narrateur(s): Kaleo Griffith
- Durée: 4 h et 10 min
- Date de publication: 2020-07-21
- Langue: Anglais
-
In a world of digital technology, it’s easy to forget one sobering fact: Our identity can be stolen from under our noses, with one click of the mouse, propelling us into nightmares in a matter of minutes, anytime, anywhere, and on any one of our darling gadgets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Securing AI in Finance, Volume 1
- Strategies for the Latin American Market
- Auteur(s): Avi Pilcer
- Narrateur(s): Avi Pilcer
- Durée: 2 h et 54 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Your AI systems handle millions in transactions daily. Are they truly secure? This essential guide reveals how Latin American financial institutions are protecting their AI infrastructure against emerging threats — from quantum attacks to model manipulation. Written for decision-makers who need to understand both the threats and solutions in our rapidly evolving financial landscape. Discover proven frameworks for securing AI systems while maintaining competitive advantage in one of the world's most dynamic banking markets.
-
Securing AI in Finance, Volume 1
- Strategies for the Latin American Market
- Narrateur(s): Avi Pilcer
- Durée: 2 h et 54 min
- Date de publication: 2025-03-27
- Langue: Anglais
-
Your AI systems handle millions in transactions daily. Are they truly secure? This essential guide reveals how Latin American financial institutions are protecting their AI infrastructure against emerging threats — from quantum attacks to model manipulation.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Audacity to Spy
- How Government, Business, and Hackers Rob Us of Privacy
- Auteur(s): Catherine Nolan, Ashley M. Wilson JD
- Narrateur(s): Randal Schaffer
- Durée: 4 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources.
-
The Audacity to Spy
- How Government, Business, and Hackers Rob Us of Privacy
- Narrateur(s): Randal Schaffer
- Durée: 4 h et 14 min
- Date de publication: 2016-08-11
- Langue: Anglais
- The Audacity to Spy reveals the ways in which your identity and personal data have been stolen by various sources....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Auteur(s): Department of Justice FBI NSA Department of State
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Date de publication: 2023-06-21
- Langue: Anglais
-
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security
- Small Business: A Hacker's Playground
- Auteur(s): Jason L. Rorie
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 45 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook is for small business owners. My goal is to get small business owners out of the mindset that cyber threats are too big for their business. This is never the right mindset to keep because an attack can and will happen to you if you don’t have the proper cyber security in place. You have to put protection methods in place to keep your business safe in today’s cyber world.
-
Cyber Security
- Small Business: A Hacker's Playground
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 45 min
- Date de publication: 2020-01-08
- Langue: Anglais
-
This audiobook is for small business owners. My goal is to get small business owners out of the mindset that cyber threats are too big for their business....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Sinister Shackles
- Understanding Ransomware: Data Encryption and Extortion
- Auteur(s): Logan Lockwood
- Narrateur(s): Sean P. Chapman
- Durée: 1 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Arm yourself with proactive measures and best practices to fortify your defenses. With this invaluable knowledge, you will be equipped to safeguard your organization and ensure its resilience in the face of this ever-present danger. The time to act is now—protect your business from the relentless onslaught of ransomware and its sinister shackles.
-
Sinister Shackles
- Understanding Ransomware: Data Encryption and Extortion
- Narrateur(s): Sean P. Chapman
- Durée: 1 h et 39 min
- Date de publication: 2023-08-14
- Langue: Anglais
-
Arm yourself with proactive measures and best practices to fortify your defenses. With this invaluable knowledge, you will be equipped to safeguard your organization and ensure its resilience in the face of this ever-present danger....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Democracy in Danger
- How Hackers and Activists Exposed Fatal Flaws in the Election System
- Auteur(s): Jake Braun
- Narrateur(s): James Lurie
- Durée: 6 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
When cybersecurity expert Jake Braun challenged hackers at DEFCON, the largest hacking conference in the world, to breach the security of an American voting machine, a hacker in Europe conquered the task in less than two minutes. From hacking into voting machines to more mundane, but no less serious problems, America's democracy faces unprecedented tests from within and without.
-
Democracy in Danger
- How Hackers and Activists Exposed Fatal Flaws in the Election System
- Narrateur(s): James Lurie
- Durée: 6 h et 53 min
- Date de publication: 2019-10-08
- Langue: Anglais
-
When cybersecurity expert Jake Braun challenged hackers at DEFCON, the largest hacking conference in the world, to breach the security of an American voting machine, a hacker in Europe conquered the task in less than two minutes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hack Proof
- A Guide to Cybersecurity for Your Business
- Auteur(s): Sergey Poltev
- Narrateur(s): Ethan Walsh
- Durée: 3 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
You need to understand what’s come before so that you can guard against it happening to you… and you need to know exactly what to do to make sure your business is secure. You also need to understand exactly what your cybersecurity status is right now so you can pinpoint the holes that need patching… and the chances are, there’s more to patch up than you realize. Because here’s the kicker: Technology is vital to the success of your company – and that means you have to keep it safe.
-
-
Technology
- Écrit par Joseph Mendoza le 2024-08-12
-
Hack Proof
- A Guide to Cybersecurity for Your Business
- Narrateur(s): Ethan Walsh
- Durée: 3 h et 47 min
- Date de publication: 2024-07-26
- Langue: Anglais
-
You need to understand what’s come before so that you can guard against it happening to you… and you need to know exactly what to do to make sure your business is secure.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Warfare in 2022
- Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates
- Auteur(s): Michael A. Goedeker MSc
- Narrateur(s): Mandy Grant-Grierson
- Durée: 3 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It’s 2022. Do you know if your online information is safe? According to a study by the University of Maryland, hackers attack internet-connected computers every 39 seconds. The same technology that’s made information sharing easier has put our privacy at risk more than ever. But it doesn’t stop there. International warfare is now waged on the digital stage, changing how countries influence global conflicts' outcomes. We live in an era of computers, data, and digital connections. This book will give you a better understanding of the current threats and solutions from the world of cyber warfare.
-
Cyber Warfare in 2022
- Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates
- Narrateur(s): Mandy Grant-Grierson
- Durée: 3 h et 19 min
- Date de publication: 2023-11-18
- Langue: Anglais
-
We live in an era of computers, data, and digital connections. This book will give you a better understanding of the current threats and solutions from the world of cyber warfare....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,09 $ ou gratuit avec l'essai de 30 jours
-
-
-
StopRansomware Guide
- Auteur(s): CISA NSA FBI and Multistate Information Sharing and Analysis Center
- Narrateur(s): Tom Brooks
- Durée: 3 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Over time, malicious actors have adjusted their ransomware tactics to be more destructive and impactful, and have also exfiltrated victim data and pressured victims to pay by threatening to release the stolen data.
-
StopRansomware Guide
- Narrateur(s): Tom Brooks
- Durée: 3 h et 9 min
- Date de publication: 2023-11-08
- Langue: Anglais
-
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
CISA Cybersecurity Strategic Plan FY2024-2026
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Malicious cyber actors recognize our dependence on technology and constantly attempt to exploit this reliance for financial or strategic gain. Too often, they succeed. Their success is enabled by an environment of insecurity, in which our enterprises are too difficult to defend, and our technology products are too vulnerable to protect.
-
CISA Cybersecurity Strategic Plan FY2024-2026
- Narrateur(s): Tom Brooks
- Durée: 2 h et 37 min
- Date de publication: 2023-09-28
- Langue: Anglais
-
Malicious cyber actors recognize our dependence on technology and constantly attempt to exploit this reliance for financial or strategic gain. Too often, they succeed....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Beginners: 3 Books in 1
- What You Must Know About Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
- Auteur(s): Attila Kovacs
- Narrateur(s): Matyas J
- Durée: 5 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this audiobook you will learn: What types of roles exist in the field of Cybersecurity, what key concepts and methodologies you must learn in Cybersecurity, what are the key technologies that you should be aware, how to get started in the field of Cybersecurity, what kind of Cybersecurity entry level salary you can expect, how to overcome obstructions and get things done, how to become a project oriented security professional, what kind of mindset you must have in Cybersecurity, how to express your unique voice in Cybersecurity, and much more!
-
Cybersecurity for Beginners: 3 Books in 1
- What You Must Know About Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
- Narrateur(s): Matyas J
- Série: Cybersecurity for Beginners
- Durée: 5 h et 47 min
- Date de publication: 2020-04-10
- Langue: Anglais
-
In this audiobook you will learn: What types of roles exist in the field of Cybersecurity, what key concepts and methodologies you must learn in Cybersecurity, what are the key technologies that you should be aware, how to get started in the field of Cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity
- The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
- Auteur(s): Trust Genics
- Narrateur(s): Leon Tietz
- Durée: 3 h et 48 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk. At an individual level, a cybersecurity attack can result in everything from identity theft to extortion attempts, to the loss of important data like family photos. However, there are simple things you can do to protect yourself, your family, and your work.
-
Cybersecurity
- The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
- Narrateur(s): Leon Tietz
- Durée: 3 h et 48 min
- Date de publication: 2020-03-07
- Langue: Anglais
-
Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
9,08 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hack Your Way to Security Bundle, 2 in 1 Bundle
- Auteur(s): G.K. Boston, Teddy Alger
- Narrateur(s): Shafi
- Durée: 1 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you concerned about the security of your online accounts and personal information? This audiobook bundle is the ultimate guide to hacking, designed to help you understand how hackers work and how to protect yourself from cyber attacks. In this bundle, you'll discover the fundamentals of hacking and how to use basic tools and techniques to test your own security vulnerabilities. This bundle offers a comprehensive overview of hacking principles, with practical tips and strategies for protecting yourself from common attacks.
-
Hack Your Way to Security Bundle, 2 in 1 Bundle
- Narrateur(s): Shafi
- Durée: 1 h et 25 min
- Date de publication: 2023-05-05
- Langue: Anglais
-
Are you concerned about the security of your online accounts and personal information? This audiobook bundle is the ultimate guide to hacking, designed to help you understand how hackers work and how to protect yourself from cyber attacks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
World War ‘D’
- The Intersection of Cyber and Biological Pandemics
- Auteur(s): Christopher Rence
- Narrateur(s): Liam Alan
- Durée: 2 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Life has never been easier thanks to the advancement of technology. However, with all new technological advancements also come new risks. The most drastically increasing issue in the world today is not biological warfare, but cyber warfare. Data has become the single most valuable commodity in today’s world, and, of course, there are always people lurking around the corner, trying to get their hands on it.
-
World War ‘D’
- The Intersection of Cyber and Biological Pandemics
- Narrateur(s): Liam Alan
- Durée: 2 h et 22 min
- Date de publication: 2024-06-04
- Langue: Anglais
-
Life has never been easier thanks to the advancement of technology. However, with all new technological advancements also come new risks. The most drastically increasing issue in the world today is not biological warfare, but cyber warfare.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,15 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Auteur(s): Niels Starling
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security. We all think our information is at risk when actually hiding it away runs the greatest risk.
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Date de publication: 2020-12-16
- Langue: Anglais
-
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-