Computer Hacking
-
-
Hacking the Code of Life
- How Gene Editing Will Rewrite Our Futures
- Auteur(s): Nessa Carey
- Narrateur(s): Karen Cass
- Durée: 4 h et 41 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
Just 45 years ago, the age of gene modification was born. Researchers could create glow-in-the-dark mice, farmyard animals producing drugs in their milk, and vitamin-enhanced rice that could prevent half a million people going blind every year. But now GM is rapidly being supplanted by a new system called CRISPR or "gene editing". Using this approach, scientists can manipulate the genes of almost any organism with a degree of precision, ease and speed that we could only dream of ten years ago.
-
Hacking the Code of Life
- How Gene Editing Will Rewrite Our Futures
- Narrateur(s): Karen Cass
- Durée: 4 h et 41 min
- Date de publication: 2019-06-11
- Langue: Anglais
-
Just 45 years ago, the age of gene modification was born. But now GM is rapidly being supplanted by a new system called CRISPR or "gene editing". Using this approach, scientists can manipulate the genes of almost any organism with precision, ease and speed....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking Humanity
- How technology can save your health and your life
- Auteur(s): Lara Lewington
- Narrateur(s): Lara Lewington
- Durée: 8 h et 24 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Brought to you by Penguin. What if we could stop cancer in its tracks, prevent cardiovascular disease, lose weight at will and reverse the effects of ageing? With new developments in artificial intelligence, gene editing and robotics, it might all be possible sooner than you think. In Hacking...
-
Hacking Humanity
- How technology can save your health and your life
- Narrateur(s): Lara Lewington
- Durée: 8 h et 24 min
- Date de publication: 2025-07-10
- Langue: Anglais
- Brought to you by Penguin. What if we could stop cancer in its tracks, prevent cardiovascular disease, lose weight at will and reverse the effects of ageing? With new developments in artificial intelligence, gene editing and robotics, it might all be possible sooner than you think. In Hacking...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,51 $ ou gratuit avec l'essai de 30 jours
-
-
-
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Auteur(s): Heidi Boghosian
- Narrateur(s): Charles Hubble
- Durée: 7 h et 27 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities. No one is exempt from data mining: by owning a smartphone, or using social media or a credit card, we...
-
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Narrateur(s): Charles Hubble
- Série: Myths Made in America
- Durée: 7 h et 27 min
- Date de publication: 2021-07-13
- Langue: Anglais
- An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities. No one is exempt from data mining: by owning a smartphone, or using social media or a credit card, we...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
George and the Unbreakable Code
- Auteur(s): Stephen Hawking, Lucy Hawking
- Narrateur(s): Roy McMillan, Sophie Aldred
- Durée: 6 h et 55 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
George and Annie are off on another cosmic adventure to figure out why strange things are happening on Earth in the fourth book of the George’s Secret Key series from Stephen and Lucy Hawking. George and his best friend Annie haven’t had any space adventures for a while and they’re missing...
-
George and the Unbreakable Code
- Narrateur(s): Roy McMillan, Sophie Aldred
- Série: George, Livre 4
- Durée: 6 h et 55 min
- Date de publication: 2016-09-06
- Langue: Anglais
- George and Annie are off on another cosmic adventure to figure out why strange things are happening on Earth in the fourth book of the George’s Secret Key series from Stephen and Lucy Hawking. George and his best friend Annie haven’t had any space adventures for a while and they’re missing...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
19,99 $ ou gratuit avec l'essai de 30 jours
-
-
-
Machine Learning: Two-Book Bundle
- Machine Learning: Master the Three Types of Machine Learning, Hacking: Computer Hacking Mastery
- Auteur(s): Robert Keane
- Narrateur(s): Mike Davis
- Durée: 2 h et 56 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This audiobook includes two manuscripts, Machine Learning: Master the Three Types of Machine Learning and Hacking: Computer Hacking Mastery. Machine learning is vital to the world of information technology, and the world of hacking has changed so much in recent years. This guidebook has all the information that you need about machine learning and the most common hacks that are going on today.
-
Machine Learning: Two-Book Bundle
- Machine Learning: Master the Three Types of Machine Learning, Hacking: Computer Hacking Mastery
- Narrateur(s): Mike Davis
- Durée: 2 h et 56 min
- Date de publication: 2018-01-02
- Langue: Anglais
-
This audiobook includes two manuscripts, Machine Learning: Master the Three Types of Machine Learning and Hacking: Computer Hacking Mastery....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: The Ultimate Beginners Guide
- Auteur(s): Max Green
- Narrateur(s): Anna Castiglioni
- Durée: 59 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
Have you always wanted to hack? Well, this book contains tons of tips and strategies on how to hack. The whole idea of "hacking" may seem hard, but in this step-by-step guide, you'll learn everything you need to know about hacking. Even if you aren't a beginner, this book contains tons of new information on hacking. Listen to become a hacking master today!
-
Hacking: The Ultimate Beginners Guide
- Narrateur(s): Anna Castiglioni
- Durée: 59 min
- Date de publication: 2015-12-21
- Langue: Anglais
- The whole idea of "hacking" may seem hard, but in this step-by-step guide, you'll learn everything you need to know about hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Programming: The Doctrine: An Introduction to the Language of Computer Programming
- From User-Friendly HTML to the More Advanced Python. C, C++, C#, Coding, Rasberry Pi and Black Hat Hacking
- Auteur(s): Adesh Silva
- Narrateur(s): Mitchell Reuter
- Durée: 3 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Did you know that coding and programming jobs are one of the most secure and best-paid jobs around the world? According to BSL, the median annual wage for computer programmers was $84,280 in 2018. The field is growing strong and companies are headhunting coders. But even if you don't want to become a professional coder, programming skills increase your salary in other fields such as marketing, finance, and business analysis. Several studies have shown that programming skills added more than $20,000 to the annual salary.
-
Computer Programming: The Doctrine: An Introduction to the Language of Computer Programming
- From User-Friendly HTML to the More Advanced Python. C, C++, C#, Coding, Rasberry Pi and Black Hat Hacking
- Narrateur(s): Mitchell Reuter
- Durée: 3 h et 29 min
- Date de publication: 2019-10-03
- Langue: Anglais
-
Have you ever been so wrapped up in a puzzle or game that you couldn’t put it down until you solved it? Programming is like that. It meets your mind’s need for stimulation and exercise. And it’s incredibly rewarding. Yet, Coding is not just a free-time activity for tech geeks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Auteur(s): Ed Adams
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Date de publication: 2024-03-26
- Langue: Anglais
-
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization can contribute to improving its cybersecurity backbone.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
Alias Fortezza
- A Hacker's Odyssey
- Auteur(s): David Schrooten, Freke Vuijst
- Narrateur(s): Boris Hiestand, Freke Vuijst
- Durée: 14 h et 30 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
In 2012, 21-year-old Dutch hacker David Schrooten was living at his parents’ house in the Netherlands and spending most of his time online. When he wasn’t squabbling with fellow hackers, he was making plans to visit his Romanian girlfriend. His life turned upside-down when Interpol agents arrested him at an airport in Romania on international hacking charges involving $63 million in damages. Soon Schrooten found himself extradited to the United States, a country where he had never been before.
-
-
Good Story. I don't agree with portrayal
- Écrit par James le 2019-07-10
-
Alias Fortezza
- A Hacker's Odyssey
- Narrateur(s): Boris Hiestand, Freke Vuijst
- Durée: 14 h et 30 min
- Date de publication: 2019-02-28
- Langue: Anglais
-
In 2012, 21-year-old Dutch hacker David Schrooten's life turned upside-down when Interpol agents arrested him on international hacking charges involving $63 million in damages. Soon Schrooten found himself extradited to the United States, a country where he had never been before....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
43,80 $ ou gratuit avec l'essai de 30 jours
-
-
-
3分ハッキング サイバー攻撃から身を守る知識
- Narrateur(s): 加藤 ルイ
- Durée: 4 h et 51 min
- Date de publication: 2025-10-31
- Langue: Japonais
- 遠隔操作、身代金の要求、ログイン情報やファイルの窃取……テレワークのPCは危険にさらされている!?
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,91 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking
- The Ultimate Comprehensive Step-by-Step Guide to the Basics of Ethical Hacking
- Auteur(s): Kevin Clark
- Narrateur(s): Jim D. Johnston
- Durée: 3 h et 27 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This audiobook will help you learn to hack in an easy and step-by-step method. Previously, only computer networks were getting hacked, but in today’s modern world, technology has grown immensely, and now, many other fields are vulnerable to hacking. From laptops to smartphones to printers, our devices are getting more prone to hacking, as hackers target common users to get access to their confidential information or bank details.
-
Hacking
- The Ultimate Comprehensive Step-by-Step Guide to the Basics of Ethical Hacking
- Narrateur(s): Jim D. Johnston
- Durée: 3 h et 27 min
- Date de publication: 2020-01-29
- Langue: Anglais
-
This audiobook will help you learn to hack in an easy and step-by-step method. Previously, only computer networks were getting hacked, but in today’s modern world, technology has grown immensely, and now, many other fields are vulnerable to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,10 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking
- Hacking for Beginners, Basic Security & How to Hack
- Auteur(s): Jacob Hatcher
- Narrateur(s): Luke Rounda
- Durée: 3 h et 34 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government. This book lists the various ways hackers can breach the security of an individual or an organization's data and network. Its information is for learning purposes only, and the hacking techniques should not be tried because it is a crime to hack someone's personal details without his or her consent.
-
Hacking
- Hacking for Beginners, Basic Security & How to Hack
- Narrateur(s): Luke Rounda
- Durée: 3 h et 34 min
- Date de publication: 2017-01-06
- Langue: Anglais
- Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Hacking
- Wars in Virtual Space
- Auteur(s): Scientific American
- Narrateur(s): George Newbern
- Durée: 4 h et 50 min
- Version intégrale
-
Au global3
-
Performance2
-
Histoire2
In Cyber Hacking: Wars in Virtual Space, we peer behind the cyber curtain. First, we look at the hackers - who they are, how they work, their motivations, and methods. The opening article examines hardware - specifically microprocessors and why they are vulnerable to tampering. Then we turn to the internal attacks, the worms and viruses whose resulting damage ranges from merely inconvenient and attention-getting to expensive and dangerous. Next, we take a broad look at issues of privacy and the technology used to gather and track personal information.
-
Cyber Hacking
- Wars in Virtual Space
- Narrateur(s): George Newbern
- Durée: 4 h et 50 min
- Date de publication: 2020-07-14
- Langue: Anglais
-
In Cyber Hacking: Wars in Virtual Space, we peer behind the cyber curtain. First, we look at the hackers - who they are, how they work, their motivations, and methods. The opening article examines hardware - specifically microprocessors and why they are vulnerable to tampering....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,12 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: A Concise Guide To Ethical Hacking - Everything You Need To Know! (Penetration Testing)
- Narrateur(s): Sean Tivenan
- Durée: 1 h et 52 min
- Date de publication: 2017-11-03
- Langue: Anglais
-
Everything you need to know about ethical hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Murdle Jr.: Codes, Cover-Ups, and Cookies
- Auteur(s): G.T. Karber, Wendy Mass
- Durée: 7 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Inspired by the internationally bestselling Murdle phenomenon, comes the second novel in the thrilling mystery series for fans of The Candymakers and The Swifts. Olivia is literally the world's smartest detective. She can hack into any computer, get past any firewall, download anything she wants...
-
Murdle Jr.: Codes, Cover-Ups, and Cookies
- Série: Murdle Junior Mysteries
- Durée: 7 h
- Date de publication: 2026-07-14
- Langue: Anglais
- Inspired by the internationally bestselling Murdle phenomenon, comes the second novel in the thrilling mystery series for fans of The Candymakers and The Swifts. Olivia is literally the world's smartest detective. She can hack into any computer, get past any firewall, download anything she wants...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
29,13 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking University: Junior Edition
- Learn Python Computer Programming from Scratch
- Auteur(s): Isaac D. Cody
- Narrateur(s): Kevin Theis
- Durée: 2 h et 2 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Programming has never been more in demand in today's world and for tomorrow's job market. Python has set the standards in terms of the go-to programming language for many small and big businesses. The third volume of Hacking University will help you become a proficient programmer in the Python language. The book itself contains actual step-by-step techniques and guides to simplify the programming process. It will be fun, informative, and very user friendly!
-
Hacking University: Junior Edition
- Learn Python Computer Programming from Scratch
- Narrateur(s): Kevin Theis
- Durée: 2 h et 2 min
- Date de publication: 2016-10-19
- Langue: Anglais
- Programming has never been more in demand in today's world and for tomorrow's job market. Python has set the standards in terms of the go-to programming language....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- Auteur(s): Anthony Farrior
- Narrateur(s): Jennifer Workman
- Durée: 14 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- Narrateur(s): Jennifer Workman
- Durée: 14 min
- Date de publication: 2024-07-01
- Langue: Anglais
-
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts and techniques.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Auteur(s): Lester Evans
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Version intégrale
-
Au global2
-
Performance1
-
Histoire1
If you want to avoid getting hacked, having your information spread, and discover the world of ethical hacking then pay attention.... Two manuscripts in one audiobook: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyber-Warfare, Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber-Security of Computer Networks, Including Tips on Social Engineering.
-
-
An interesting read, not a guide or study manual
- Écrit par Joel C LaRusic le 2019-08-06
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Date de publication: 2019-02-07
- Langue: Anglais
-
How hackers use raunchy photos to eke out private information; examples of preposterous social engineering attacks; how there's only one surefire way to protect against hacking; how to lower your exposure to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
#HACKED2
- Practical Guidance for Dealing with Threats to Your Business and Privacy
- Auteur(s): Albert E. Whale, Thomas Albert, Chuck Brooks, Autres
- Narrateur(s): David Roth
- Durée: 5 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
#HACKED2 is the follow-up to an award-winning book #HACKED, that was written with industry leaders in cybersecurity. It offers practical advice about what you can do if your business or privacy has been threatened, but it also provides multiple viewpoints on how these issues are being addressed across various fields around the globe - making this resource essential for anyone who wants better awareness of global threats faced today!
-
#HACKED2
- Practical Guidance for Dealing with Threats to Your Business and Privacy
- Narrateur(s): David Roth
- Durée: 5 h et 8 min
- Date de publication: 2024-03-27
- Langue: Anglais
-
#HACKED2 is the follow-up to an award-winning book #HACKED, that was written with industry leaders in cybersecurity. It offers practical advice about what you can do if your business or privacy has been threatened.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- Auteur(s): Murphy Rangel
- Narrateur(s): Luciano Marin
- Durée: 3 h et 46 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- Narrateur(s): Luciano Marin
- Durée: 3 h et 46 min
- Date de publication: 2020-01-08
- Langue: Anglais
-
Interested in the field of Hacking with Kali Linux? Then this audiobook is for you! This audiobook is aimed at beginners, and will take you through the basics of computer hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-