Computer Security
-
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- Auteur(s): Phil Martin
- Narrateur(s): Phil Martin
- Durée: 17 h
- Version intégrale
-
Au global10
-
Performance7
-
Histoire7
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. Many books have tried to simplify this but fail to leave behind the $100 words and run-on sentences. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire official study guide and breaks it down into easy-to-absorb chapters with simple language. Tons of examples are included to drive the points home in a way that makes it effortless to remember.
-
-
Great book, not great narration
- Écrit par Amazon Customer le 2019-02-14
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- Narrateur(s): Phil Martin
- Durée: 17 h
- Date de publication: 2018-10-17
- Langue: Anglais
-
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire study guide and breaks it into easy-to-absorb chapters....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Auteur(s): Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Date de publication: 2024-02-20
- Langue: Anglais
-
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Zero Trust Architecture
- Networking Technology: Security
- Auteur(s): Cindy Green-Ortiz, Brandon Fowler, David Houck, Autres
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Zero Trust Architecture
- Networking Technology: Security
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Date de publication: 2024-04-11
- Langue: Anglais
-
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,27 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Rule of Thoughts (Mortality Doctrine, Book Two)
- Auteur(s): James Dashner
- Narrateur(s): Erik Davies
- Durée: 10 h et 11 min
- Version intégrale
-
Au global8
-
Performance8
-
Histoire8
From James Dashner, author of the #1 New York Times bestselling MAZE RUNNER series, comes the second book in the bestselling Mortality Doctrine series, an edge-of-your-seat cyber-adventure trilogy that includes The Eye of Minds and The Game of Lives. Includes a sneak peek of The Fever Code...
-
The Rule of Thoughts (Mortality Doctrine, Book Two)
- Narrateur(s): Erik Davies
- Série: Mortality Doctrine, Livre 2
- Durée: 10 h et 11 min
- Date de publication: 2014-08-26
- Langue: Anglais
- From James Dashner, author of the #1 New York Times bestselling MAZE RUNNER series, comes the second book in the bestselling Mortality Doctrine series, an edge-of-your-seat cyber-adventure trilogy that includes The Eye of Minds and The Game of Lives. Includes a sneak peek of The Fever Code...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,97 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Fundamentals
- Governance Risk & Compliance (GRC) (Cybersecurity Beginner, Book 2)
- Auteur(s): Bruce Brown
- Narrateur(s): Kevin Howard
- Durée: 3 h et 16 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Discover the Secrets of Cybersecurity Governance, Risk, and Compliance with Cybersecurity Fundamentals: Governance, Risk & Compliance by Bruce Brown, CISSP, CGRC. In the ever-evolving world of cybersecurity, understanding the intricacies of Governance, Risk, and Compliance (GRC) is not just beneficial—it's essential. Despite being one of the most crucial areas in cybersecurity, GRC is often overlooked, leaving many professionals unprepared for the challenges ahead. This book changes that narrative.
-
Cybersecurity Fundamentals
- Governance Risk & Compliance (GRC) (Cybersecurity Beginner, Book 2)
- Narrateur(s): Kevin Howard
- Série: Cybersecurity Beginner, Livre 2
- Durée: 3 h et 16 min
- Date de publication: 2024-10-03
- Langue: Anglais
-
Discover the Secrets of Cybersecurity Governance, Risk, and Compliance with Cybersecurity Fundamentals: Governance, Risk & Compliance by Bruce Brown, CISSP, CGRC.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Auteur(s): Roger A. Grimes
- Narrateur(s): Mike Lenz
- Durée: 13 h et 30 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Narrateur(s): Mike Lenz
- Durée: 13 h et 30 min
- Date de publication: 2025-07-01
- Langue: Anglais
-
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Strong Passwords
- 10 Golden Rules for Online Security (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 7)
- Auteur(s): Sabian Gralden
- Narrateur(s): George D Cummings
- Durée: 2 h et 16 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In the ever-expanding digital world, your password is more than just a string of characters—it’s the front door to your online life. Every email, social media post, financial transaction, and cloud-stored file is protected (or not) by the strength of your passwords. Yet despite their vital role, most people still treat passwords as a nuisance rather than the keystones of personal security.
-
Strong Passwords
- 10 Golden Rules for Online Security (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 7)
- Narrateur(s): George D Cummings
- Série: Con Men, Scams, Phishing and other Disgusting Practices and How to Get Ahead of Them, Livre 7
- Durée: 2 h et 16 min
- Date de publication: 2025-12-19
- Langue: Anglais
-
In the ever-expanding digital world, your password is more than just a string of characters—it’s the front door to your online life. Every email, social media post, financial transaction, and cloud-stored file is protected (or not) by the strength of your passwords.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- Auteur(s): Roger A. Grimes
- Narrateur(s): Ray Greenley
- Durée: 11 h et 43 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.
-
-
I dash think dash you dash need dash links dash in download able dash pdf
- Écrit par Fedaykin Wolf le 2024-05-14
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- Narrateur(s): Ray Greenley
- Durée: 11 h et 43 min
- Date de publication: 2024-03-26
- Langue: Anglais
-
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
There's No Such Thing as Crypto Crime
- An Investigative Handbook
- Auteur(s): Nick Furneaux
- Narrateur(s): Mitch Crawford
- Durée: 20 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains. The book explores the criminal opportunities available to malicious actors in the crypto universe, as well as the investigative principles common to this realm.
-
There's No Such Thing as Crypto Crime
- An Investigative Handbook
- Narrateur(s): Mitch Crawford
- Durée: 20 h et 29 min
- Date de publication: 2024-12-31
- Langue: Anglais
-
Accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Date de publication: 2024-05-28
- Langue: Anglais
-
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- Auteur(s): Keith Martin
- Narrateur(s): Matthew Waterson
- Durée: 7 h et 45 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies - in short, everything we do online.
-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- Narrateur(s): Matthew Waterson
- Durée: 7 h et 45 min
- Date de publication: 2020-05-19
- Langue: Anglais
-
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Auteur(s): Gabriella Coleman
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Version intégrale
-
Au global2
-
Performance1
-
Histoire1
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Date de publication: 2017-01-31
- Langue: Anglais
- Anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,82 $ ou gratuit avec l'essai de 30 jours
-
-
-
ISO 9001:2015
- A Pocket Guide
- Auteur(s): Steve Watkins, Nick Orchiston
- Narrateur(s): Andy Cresswell
- Durée: 1 h et 11 min
- Version intégrale
-
Au global3
-
Performance1
-
Histoire1
Currently used by more than 1.1 million organizations worldwide, the international standard ISO 9001:2015 is the world’s most established quality framework. ISO 9001:2015 - A Pocket Guide is a handy reference audiobook that provides an overview of the ISO 9001 quality management standard.
-
ISO 9001:2015
- A Pocket Guide
- Narrateur(s): Andy Cresswell
- Durée: 1 h et 11 min
- Date de publication: 2018-12-04
- Langue: Anglais
-
Currently used by more than 1.1 million organizations worldwide, the international standard ISO 9001:2015 is the world’s most established quality framework. This is a handy reference audiobook that provides an overview of the ISO 9001 quality management standard....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
Blockchain and the Law
- The Rule of Code
- Auteur(s): Primavera De Filippi, Aaron Wright
- Narrateur(s): Teri Schnaubelt
- Durée: 8 h et 55 min
- Version intégrale
-
Au global4
-
Performance3
-
Histoire3
Blockchain technology could affect governance itself by supporting new organizational structures that promote more democratic and participatory decision making. Primavera De Filippi and Aaron Wright acknowledge this potential and urge the law to catch up. That is because disintermediation - a blockchain's greatest asset - subverts critical regulation. By cutting out middlemen, such as online operators and multinational corporations, blockchains run the risk of undermining the capacity of governmental authorities to supervise activities in banking, commerce, law, and other vital areas.
-
Blockchain and the Law
- The Rule of Code
- Narrateur(s): Teri Schnaubelt
- Durée: 8 h et 55 min
- Date de publication: 2018-08-21
- Langue: Anglais
-
De Filippi and Wright welcome the new possibilities inherent in blockchains. But as Blockchain and the Law makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- Auteur(s): Thomas J. Parenty, Jack J. Domet
- Narrateur(s): Jonathan Todd Ross
- Durée: 5 h et 47 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- Narrateur(s): Jonathan Todd Ross
- Durée: 5 h et 47 min
- Date de publication: 2019-12-03
- Langue: Anglais
-
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Safeguard
- Practical Steps for Digital Privacy and Online Safety
- Auteur(s): Sage Ellison
- Narrateur(s): Kelly E Harnett's voice replica
- Durée: 4 h et 11 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
"Safeguard: Practical Steps for Digital Privacy and Online Safety" by Sage Ellison offers a comprehensive guide to enhancing your online security and privacy in today’s digital world. As the threat to personal information rises, this book addresses common concerns such as identity theft, phishing scams, and the overwhelming complexity of cybersecurity jargon. Ellison provides a clear roadmap for individuals looking to protect their online presence, emphasizing community awareness and proactive measures.
-
Safeguard
- Practical Steps for Digital Privacy and Online Safety
- Narrateur(s): Kelly E Harnett's voice replica
- Durée: 4 h et 11 min
- Date de publication: 2025-10-24
- Langue: Anglais
-
"Safeguard: Practical Steps for Digital Privacy and Online Safety" by Sage Ellison offers a comprehensive guide to enhancing your online security and privacy in today’s digital world.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Because You Can: Your Cybersecurity Career
- A Simple and Practical Handbook with Actionable Insights for Success
- Auteur(s): Ali Khan, Gaurav Kumar, Arlene Worsley
- Narrateur(s): Skye Alley
- Durée: 9 h et 42 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most sought-after professionals. Cybersecurity is one of the hottest jobs on the market today, with comparatively high wages and unparalleled growth opportunities. With the organic move to the cloud, digital-first initiatives, and the socioeconomic pressures from the pandemic, the cybersecurity talent demand is unprecedented.
-
Because You Can: Your Cybersecurity Career
- A Simple and Practical Handbook with Actionable Insights for Success
- Narrateur(s): Skye Alley
- Durée: 9 h et 42 min
- Date de publication: 2022-04-20
- Langue: Anglais
-
As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most sought-after professionals. Cybersecurity is one of the hottest jobs on the market today, with comparatively high wages and unparalleled growth opportunities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Auteur(s): L.D. Knowings
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Vulnerable System
- The History of Information Security in the Computer Age
- Auteur(s): Andrew J. Stewart
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
A Vulnerable System
- The History of Information Security in the Computer Age
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Date de publication: 2021-09-14
- Langue: Anglais
-
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-