Computer Hacking
-
-
Machine Learning: Two-Book Bundle
- Machine Learning: Master the Three Types of Machine Learning, Hacking: Computer Hacking Mastery
- Auteur(s): Robert Keane
- Narrateur(s): Mike Davis
- Durée: 2 h et 56 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
This audiobook includes two manuscripts, Machine Learning: Master the Three Types of Machine Learning and Hacking: Computer Hacking Mastery. Machine learning is vital to the world of information technology, and the world of hacking has changed so much in recent years. This guidebook has all the information that you need about machine learning and the most common hacks that are going on today.
-
Machine Learning: Two-Book Bundle
- Machine Learning: Master the Three Types of Machine Learning, Hacking: Computer Hacking Mastery
- Narrateur(s): Mike Davis
- Durée: 2 h et 56 min
- Date de publication: 2018-01-02
- Langue: Anglais
-
This audiobook includes two manuscripts, Machine Learning: Master the Three Types of Machine Learning and Hacking: Computer Hacking Mastery....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Confessions of a CIA Spy
- The Art of Human Hacking
- Auteur(s): Peter Warmka
- Narrateur(s): Gary Williams
- Durée: 3 h et 42 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies that he and other threat actors use to breach the security of their targets, whether they’re high-profile individuals or entire organizations.
-
Confessions of a CIA Spy
- The Art of Human Hacking
- Narrateur(s): Gary Williams
- Durée: 3 h et 42 min
- Date de publication: 2021-03-02
- Langue: Anglais
-
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies to breach the security of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Programming: The Doctrine: An Introduction to the Language of Computer Programming
- From User-Friendly HTML to the More Advanced Python. C, C++, C#, Coding, Rasberry Pi and Black Hat Hacking
- Auteur(s): Adesh Silva
- Narrateur(s): Mitchell Reuter
- Durée: 3 h et 29 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Did you know that coding and programming jobs are one of the most secure and best-paid jobs around the world? According to BSL, the median annual wage for computer programmers was $84,280 in 2018. The field is growing strong and companies are headhunting coders. But even if you don't want to become a professional coder, programming skills increase your salary in other fields such as marketing, finance, and business analysis. Several studies have shown that programming skills added more than $20,000 to the annual salary.
-
Computer Programming: The Doctrine: An Introduction to the Language of Computer Programming
- From User-Friendly HTML to the More Advanced Python. C, C++, C#, Coding, Rasberry Pi and Black Hat Hacking
- Narrateur(s): Mitchell Reuter
- Durée: 3 h et 29 min
- Date de publication: 2019-10-03
- Langue: Anglais
-
Have you ever been so wrapped up in a puzzle or game that you couldn’t put it down until you solved it? Programming is like that. It meets your mind’s need for stimulation and exercise. And it’s incredibly rewarding. Yet, Coding is not just a free-time activity for tech geeks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Hacking
- Wars in Virtual Space
- Auteur(s): Scientific American
- Narrateur(s): George Newbern
- Durée: 4 h et 50 min
- Version intégrale
-
Au global4.5 out of 5 stars 3
-
Performance5 out of 5 stars 2
-
Histoire4.5 out of 5 stars 2
In Cyber Hacking: Wars in Virtual Space, we peer behind the cyber curtain. First, we look at the hackers - who they are, how they work, their motivations, and methods. The opening article examines hardware - specifically microprocessors and why they are vulnerable to tampering. Then we turn to the internal attacks, the worms and viruses whose resulting damage ranges from merely inconvenient and attention-getting to expensive and dangerous. Next, we take a broad look at issues of privacy and the technology used to gather and track personal information.
-
Cyber Hacking
- Wars in Virtual Space
- Narrateur(s): George Newbern
- Durée: 4 h et 50 min
- Date de publication: 2020-07-14
- Langue: Anglais
-
In Cyber Hacking: Wars in Virtual Space, we peer behind the cyber curtain. First, we look at the hackers - who they are, how they work, their motivations, and methods. The opening article examines hardware - specifically microprocessors and why they are vulnerable to tampering....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,12 $ ou gratuit avec l'essai de 30 jours
-
-
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Auteur(s): Ed Adams
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Date de publication: 2024-03-26
- Langue: Anglais
-
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization can contribute to improving its cybersecurity backbone.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Dark Side of the Hacking World
- What You Need to Know to Guard Your Precious Assets and Remain Safe
- Auteur(s): Mike Mason
- Narrateur(s): Jim D Johnston
- Durée: 3 h et 52 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Hackers have always been a closed, secretive circle, wary of infiltrators and keeping their secrets completely hidden from the public eye until now! This book blows the lid open on the dark side of the hacking world, bringing all of the shadowy secrets, tools of the trade, malicious methods, and high-stakes multi-millionaire lifestyles of hackers out into the open! Each chapter gives you unprecedented access to the cunning tricks, psychological manipulation, and malware that hackers could be using against you right now!
-
The Dark Side of the Hacking World
- What You Need to Know to Guard Your Precious Assets and Remain Safe
- Narrateur(s): Jim D Johnston
- Durée: 3 h et 52 min
- Date de publication: 2016-01-12
- Langue: Anglais
- This book brings all of the shadowy secrets, tools of the trade, malicious methods, and high-stakes multi-millionaire lifestyles of hackers out into the open....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
3分ハッキング サイバー攻撃から身を守る知識
- Narrateur(s): 加藤 ルイ
- Durée: 4 h et 51 min
- Date de publication: 2025-10-31
- Langue: Japonais
- 遠隔操作、身代金の要求、ログイン情報やファイルの窃取……テレワークのPCは危険にさらされている!?
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,91 $ ou gratuit avec l'essai de 30 jours
-
-
-
Kali Linux: Testing Your Network
- How to Test Infrastructure Security with Security Testing and Penetration Testing
- Auteur(s): Frank Eltrinos
- Narrateur(s): Rudy Norman
- Durée: 3 h et 39 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Increasingly, hackers are becoming a bigger problem for both businesses and individuals. If they decide to target your device, you could be locked out of your own systems or lose valuable information. Sadly, many people don’t know how to protect their networks, leaving them open to the stress and anxiety that these attacks can cause. Thankfully, you can learn the skills required to secure your network. This comprehensive audiobook will take you through everything you need to know.
-
Kali Linux: Testing Your Network
- How to Test Infrastructure Security with Security Testing and Penetration Testing
- Narrateur(s): Rudy Norman
- Durée: 3 h et 39 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
Increasingly, hackers are becoming a bigger problem for both businesses and individuals. If they decide to target your device, you could be locked out of your own systems or lose valuable information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking
- The Ultimate Comprehensive Step-by-Step Guide to the Basics of Ethical Hacking
- Auteur(s): Kevin Clark
- Narrateur(s): Jim D. Johnston
- Durée: 3 h et 27 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
This audiobook will help you learn to hack in an easy and step-by-step method. Previously, only computer networks were getting hacked, but in today’s modern world, technology has grown immensely, and now, many other fields are vulnerable to hacking. From laptops to smartphones to printers, our devices are getting more prone to hacking, as hackers target common users to get access to their confidential information or bank details.
-
Hacking
- The Ultimate Comprehensive Step-by-Step Guide to the Basics of Ethical Hacking
- Narrateur(s): Jim D. Johnston
- Durée: 3 h et 27 min
- Date de publication: 2020-01-29
- Langue: Anglais
-
This audiobook will help you learn to hack in an easy and step-by-step method. Previously, only computer networks were getting hacked, but in today’s modern world, technology has grown immensely, and now, many other fields are vulnerable to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,10 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking
- Hacking for Beginners, Basic Security & How to Hack
- Auteur(s): Jacob Hatcher
- Narrateur(s): Luke Rounda
- Durée: 3 h et 34 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government. This book lists the various ways hackers can breach the security of an individual or an organization's data and network. Its information is for learning purposes only, and the hacking techniques should not be tried because it is a crime to hack someone's personal details without his or her consent.
-
Hacking
- Hacking for Beginners, Basic Security & How to Hack
- Narrateur(s): Luke Rounda
- Durée: 3 h et 34 min
- Date de publication: 2017-01-06
- Langue: Anglais
- Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: The Ultimate Beginners Guide
- Auteur(s): Max Green
- Narrateur(s): Anna Castiglioni
- Durée: 59 min
- Version intégrale
-
Au global3.5 out of 5 stars 2
-
Performance4 out of 5 stars 2
-
Histoire3.5 out of 5 stars 2
Have you always wanted to hack? Well, this book contains tons of tips and strategies on how to hack. The whole idea of "hacking" may seem hard, but in this step-by-step guide, you'll learn everything you need to know about hacking. Even if you aren't a beginner, this book contains tons of new information on hacking. Listen to become a hacking master today!
-
Hacking: The Ultimate Beginners Guide
- Narrateur(s): Anna Castiglioni
- Durée: 59 min
- Date de publication: 2015-12-21
- Langue: Anglais
- The whole idea of "hacking" may seem hard, but in this step-by-step guide, you'll learn everything you need to know about hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Beginner’s Guide to Digital Prepping & Practical Cybersecurity
- Simple Steps to Protect Your Data, Prevent Hacking, and Secure Your Family Online (Preparedness Collection, Book 3)
- Auteur(s): Urban Readiness Collective, Silver Valley Publishing
- Narrateur(s): Ben Staab
- Durée: 2 h et 42 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Protect Your Digital Life in Minutes—Even If You’re Not Tech-Savvy! Every click, every login, and every online interaction exposes you to digital threats—identity theft, hacking, and scams that can compromise your personal and financial security. But what if protecting yourself was simpler than you thought?" A Beginner’s Guide to Digital Prepping & Practical Cybersecurity" cuts through the confusion, offering clear, step-by-step strategies to safeguard your accounts, secure your family’s digital footprint, and prevent cyber threats—without requiring advanced technical skills.
-
A Beginner’s Guide to Digital Prepping & Practical Cybersecurity
- Simple Steps to Protect Your Data, Prevent Hacking, and Secure Your Family Online (Preparedness Collection, Book 3)
- Narrateur(s): Ben Staab
- Durée: 2 h et 42 min
- Date de publication: 2025-05-06
- Langue: Anglais
-
Protect Your Digital Life in Minutes—Even If You’re Not Tech-Savvy! Every click, every login, and every online interaction exposes you to digital threats—identity theft, hacking, and scams that can compromise your personal and financial security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: A Concise Guide To Ethical Hacking - Everything You Need To Know! (Penetration Testing)
- Auteur(s): Gary Mitnick
- Narrateur(s): Sean Tivenan
- Durée: 1 h et 52 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Everything you need to know about ethical hacking.
-
Hacking: A Concise Guide To Ethical Hacking - Everything You Need To Know! (Penetration Testing)
- Narrateur(s): Sean Tivenan
- Durée: 1 h et 52 min
- Date de publication: 2017-11-03
- Langue: Anglais
-
Everything you need to know about ethical hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Non-Tech Entrepreneurs
- Essential Digital Protection for Business Owners
- Auteur(s): Nafeez Imtiaz
- Narrateur(s): Aesha Zephyr
- Durée: 4 h et 24 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In Cybersecurity for Non-Tech Entrepreneurs, Nafeez Imtiaz offers a lifeline for business builders who have zero interest in becoming tech experts but know they can’t afford to be digitally naive. This isn’t another jargon-filled guide written for engineers—it’s a vibrant, real-world playbook packed with stories, close calls, and lessons learned from scrappy startups and friends who trusted the wrong links, lost precious data, or found themselves locked out of their own creations.
-
Cybersecurity for Non-Tech Entrepreneurs
- Essential Digital Protection for Business Owners
- Narrateur(s): Aesha Zephyr
- Durée: 4 h et 24 min
- Date de publication: 2025-08-07
- Langue: Anglais
-
In Cybersecurity for Non-Tech Entrepreneurs, Nafeez Imtiaz offers a lifeline for business builders who have zero interest in becoming tech experts but know they can’t afford to be digitally naive.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybercrime
- Top 10 Things You Need to Know About It
- Auteur(s): Sabian Gralden
- Narrateur(s): Chris Reynolds
- Durée: 2 h et 13 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
This book is your guided tour through the digital underworld. In ten clear, accessible chapters, we explore the most common and dangerous forms of cybercrime. From phishing emails that trick the unwary into giving up passwords, to ransomware that can shut down entire hospitals or school systems, each chapter lifts the veil on a different threat. We explain how the attack works, who tends to be behind it, what kind of damage it causes, and how to protect yourself and your organization.
-
Cybercrime
- Top 10 Things You Need to Know About It
- Narrateur(s): Chris Reynolds
- Série: Con Men, Scams, Phishing and other Disgusting Practices and How to Get Ahead of Them, Livre 6
- Durée: 2 h et 13 min
- Date de publication: 2025-09-22
- Langue: Anglais
-
This book is a tour through the digital underworld. In ten chapters, we explore the most common and dangerous forms of cybercrime. From phishing emails that trick the unwary into giving up passwords to ransomware that can shut down entire systems, each chapter lifts the veil on a different threat.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Securing AI in Finance, Volume 1
- Strategies for the Latin American Market
- Auteur(s): Avi Pilcer
- Narrateur(s): Avi Pilcer
- Durée: 2 h et 54 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Your AI systems handle millions in transactions daily. Are they truly secure? This essential guide reveals how Latin American financial institutions are protecting their AI infrastructure against emerging threats — from quantum attacks to model manipulation. Written for decision-makers who need to understand both the threats and solutions in our rapidly evolving financial landscape. Discover proven frameworks for securing AI systems while maintaining competitive advantage in one of the world's most dynamic banking markets.
-
Securing AI in Finance, Volume 1
- Strategies for the Latin American Market
- Narrateur(s): Avi Pilcer
- Durée: 2 h et 54 min
- Date de publication: 2025-03-27
- Langue: Anglais
-
Your AI systems handle millions in transactions daily. Are they truly secure? This essential guide reveals how Latin American financial institutions are protecting their AI infrastructure against emerging threats — from quantum attacks to model manipulation.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking University: Junior Edition
- Learn Python Computer Programming from Scratch
- Auteur(s): Isaac D. Cody
- Narrateur(s): Kevin Theis
- Durée: 2 h et 2 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Programming has never been more in demand in today's world and for tomorrow's job market. Python has set the standards in terms of the go-to programming language for many small and big businesses. The third volume of Hacking University will help you become a proficient programmer in the Python language. The book itself contains actual step-by-step techniques and guides to simplify the programming process. It will be fun, informative, and very user friendly!
-
Hacking University: Junior Edition
- Learn Python Computer Programming from Scratch
- Narrateur(s): Kevin Theis
- Durée: 2 h et 2 min
- Date de publication: 2016-10-19
- Langue: Anglais
- Programming has never been more in demand in today's world and for tomorrow's job market. Python has set the standards in terms of the go-to programming language....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking ISIS
- How to Destroy the Cyber Jihad
- Auteur(s): Malcolm Nance, Christopher Sampson
- Narrateur(s): Neil Shah
- Durée: 7 h et 47 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
This book is written by two of the leading terrorist experts in the world. Hacking ISIS will explain in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world. More, the book will map out the cyberspace-level tactics on how ISIS spreads its terrifying content, how it distributes tens of thousands of pieces of propaganda daily and is winning the battle in cyberspace and how to stop it in its tracks.
-
Hacking ISIS
- How to Destroy the Cyber Jihad
- Narrateur(s): Neil Shah
- Durée: 7 h et 47 min
- Date de publication: 2018-07-09
- Langue: Anglais
-
Hacking ISIS will explain in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- Auteur(s): Anthony Farrior
- Narrateur(s): Jennifer Workman
- Durée: 14 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- Narrateur(s): Jennifer Workman
- Durée: 14 min
- Date de publication: 2024-07-01
- Langue: Anglais
-
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts and techniques.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-