Computer Security
-
-
The Four Powers: Assessments of Democracy, Abuses of Centralized Power, and Blockchain-Based National Security
- Technodemocracy
- Auteur(s): Jason M. Hanania
- Narrateur(s): Jason McCoy, Joy Lyn Shaw
- Durée: 5 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The Four Powers, Hanania provides a fast-paced historical assessment of centralized power. From World War I to crypto, Hanania explains the emerging trend toward technodemocracy: a decentralized system of governance whereby power-centralized institutions (such as churches, banks, political parties, campaign donors, Amazon, and the CIA) become obsolete.
-
The Four Powers: Assessments of Democracy, Abuses of Centralized Power, and Blockchain-Based National Security
- Technodemocracy
- Narrateur(s): Jason McCoy, Joy Lyn Shaw
- Durée: 5 h et 53 min
- Date de publication: 2024-06-25
- Langue: Anglais
-
In The Four Powers, Hanania provides a fast-paced historical assessment of centralized power.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Science 2.0 Beginners Crash Course
- Python, Javascript, Cyber Security, and Algorithms
- Auteur(s): Ian Batantu
- Narrateur(s): Brynn Fleming
- Durée: 3 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The first time I used a computer, it intrigued me to know how these interfaces work. In this audiobook, you’ll learn the same way I did.
-
Computer Science 2.0 Beginners Crash Course
- Python, Javascript, Cyber Security, and Algorithms
- Narrateur(s): Brynn Fleming
- Durée: 3 h et 18 min
- Date de publication: 2023-02-07
- Langue: Anglais
-
The first time I used a computer, it intrigued me to know how these interfaces work. In this audiobook, you’ll learn the same way I did....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
AI Security
- Using Machine Learning Techniques to Detect and Counter Cyber Threats
- Auteur(s): Dr. Arley Ballenger
- Narrateur(s): Antoine Paden
- Durée: 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
AI Security: Using Machine Learning Techniques to Detect and Counter Cyber Threats focuses on the application of artificial intelligence, particularly machine learning, to enhance cybersecurity. The book is divided into several sections that cover various aspects of AI security.
-
AI Security
- Using Machine Learning Techniques to Detect and Counter Cyber Threats
- Narrateur(s): Antoine Paden
- Durée: 33 min
- Date de publication: 2025-06-09
- Langue: Anglais
-
AI Security: Using Machine Learning Techniques to Detect and Counter Cyber Threats focuses on the application of artificial intelligence, particularly machine learning, to enhance cybersecurity. The book is divided into several sections that cover various aspects of AI security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Hidden Corporation
- A Data Management Security Novel
- Auteur(s): David Schlesinger
- Narrateur(s): Bobby Hundley
- Durée: 5 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss.
-
The Hidden Corporation
- A Data Management Security Novel
- Narrateur(s): Bobby Hundley
- Durée: 5 h et 38 min
- Date de publication: 2016-09-29
- Langue: Anglais
- Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Wiki at War: Conflict in a Socially Networked World
- Auteur(s): Dr. James Jay Carafano PhD
- Narrateur(s): Gary L. Willprecht
- Durée: 14 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people. WikiLeaks editor-in-chief Julian Assange has been branded "public enemy number one" by some in the United States for posting material on the World Wide Web that concerns airstrikes in Iraq, US diplomatic communications, and other sensitive matters.
-
Wiki at War: Conflict in a Socially Networked World
- Narrateur(s): Gary L. Willprecht
- Durée: 14 h et 12 min
- Date de publication: 2013-07-17
- Langue: Anglais
- In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
iWar
- War and Peace in the Information Age
- Auteur(s): Bill Gertz
- Narrateur(s): Danny Campbell
- Durée: 11 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
America is at war, but most of its citizens don't know it. Covert information warfare is being waged by world powers, rogue states - such as Russia, China, Iran, and North Korea - and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives.
-
iWar
- War and Peace in the Information Age
- Narrateur(s): Danny Campbell
- Durée: 11 h et 32 min
- Date de publication: 2017-01-03
- Langue: Anglais
- America is at war, but most of its citizens don't know it. Covert information warfare is being waged by world powers, rogue states - such as Russia, China, Iran, and North Korea....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,67 $ ou gratuit avec l'essai de 30 jours
-
-
-
Viral Parenting
- A Guide to Setting Boundaries, Building Trust, and Raising Responsible Kids in an Online World
- Auteur(s): Mindy McKnight
- Narrateur(s): Mindy McKnight, Shaun McKnight, Brooklyn McKnight, Autres
- Durée: 7 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Viral Parenting is a guide to raising responsible, safe, and communicative kids in the digital world. Mindy shares practical tools for having honest conversations with kids of all ages about privacy, bullying, respectfulness, and family time while emphasizing the importance of trust and open communication. These strategies are timeless - whether applied to texting, snapping, Facebooking, kiking, or whatever social media platforms await us in the future, this book is ultimately about teaching children about personal responsibility and safety.
-
Viral Parenting
- A Guide to Setting Boundaries, Building Trust, and Raising Responsible Kids in an Online World
- Narrateur(s): Mindy McKnight, Shaun McKnight, Brooklyn McKnight, Bailey McKnight
- Durée: 7 h et 28 min
- Date de publication: 2019-04-30
- Langue: Anglais
-
Viral Parenting is a guide to raising responsible, safe, and communicative kids in the digital world. Mindy shares practical tools for having honest conversations with kids of all ages about privacy, bullying, respectfulness, and family time....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
29,11 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking ISIS
- How to Destroy the Cyber Jihad
- Auteur(s): Malcolm Nance, Christopher Sampson
- Narrateur(s): Neil Shah
- Durée: 7 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book is written by two of the leading terrorist experts in the world. Hacking ISIS will explain in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world. More, the book will map out the cyberspace-level tactics on how ISIS spreads its terrifying content, how it distributes tens of thousands of pieces of propaganda daily and is winning the battle in cyberspace and how to stop it in its tracks.
-
Hacking ISIS
- How to Destroy the Cyber Jihad
- Narrateur(s): Neil Shah
- Durée: 7 h et 47 min
- Date de publication: 2018-07-09
- Langue: Anglais
-
Hacking ISIS will explain in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital Resilience
- Is Your Company Ready for the Next Cyber Threat?
- Auteur(s): Ray A. Rothrock, Richard A. Clarke - foreword
- Narrateur(s): Chris Sorensen
- Durée: 7 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Fascinating and highly listenable, Digital Resilience opens with the infamous 2013 Target attack, which compromised the credit card information of 40 million customers. In hindsight, the hack (like most today) was preventable. Data theft. Downed servers. Malware. Even human error can trigger cyber events anytime from anywhere around the globe. This powerful guide provides the resilience-building strategies you need to prevail - no matter what strikes.
-
Digital Resilience
- Is Your Company Ready for the Next Cyber Threat?
- Narrateur(s): Chris Sorensen
- Durée: 7 h et 41 min
- Date de publication: 2018-04-05
- Langue: Anglais
-
Fascinating and highly listenable, Digital Resilience opens with the infamous 2013 Target attack, which compromised the credit card information of 40 million customers....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Connected Parent
- An Expert Guide to Parenting in a Digital World
- Auteur(s): John Palfrey, Urs Gasser
- Narrateur(s): Abby Craden
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Today's teenagers spend about nine hours per day online. Parents of this ultra-connected generation struggle with decisions completely new to parenting: Should an 8-year-old be allowed to go on social media? How can parents help their children gain the most from the best aspects of the digital age? How can we keep kids safe from digital harm?
-
The Connected Parent
- An Expert Guide to Parenting in a Digital World
- Narrateur(s): Abby Craden
- Durée: 7 h et 9 min
- Date de publication: 2020-11-11
- Langue: Anglais
-
Today's teenagers spend about nine hours per day online. Parents of this ultra-connected generation struggle with decisions completely new to parenting: How can parents help their children gain the most from the best aspects of the digital age? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
29,13 $ ou gratuit avec l'essai de 30 jours
-
-
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Auteur(s): Department of Justice FBI NSA Department of State
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Date de publication: 2023-06-21
- Langue: Anglais
-
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Power to the People
- How Open Technological Innovation is Arming Tomorrow's Terrorists
- Auteur(s): Audrey Kurth Cronin
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As Audrey Kurth Cronin explains in Power to the People, what we are seeing now is an exacerbation of an age-old trend. Over the centuries, the most surprising developments in warfare have occurred because of advances in technologies combined with changes in who can use them. Indeed, accessible innovations in destructive force have long driven new patterns of political violence. When Nobel invented dynamite and Kalashnikov designed the AK-47, each inadvertently spurred terrorist and insurgent movements that killed millions and upended the international system.
-
Power to the People
- How Open Technological Innovation is Arming Tomorrow's Terrorists
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 40 min
- Date de publication: 2020-03-10
- Langue: Anglais
-
Never have so many possessed the means to be so lethal. The diffusion of modern technology to ordinary people has given them access to weapons of mass violence previously monopolized by the state....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Black Scorpion Pilot
- A Ford Stevens Military-Aviation Thriller, Volume 2
- Auteur(s): Lawrence A. Colby
- Narrateur(s): Christopher Raab
- Durée: 9 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In a hidden base in China, Lieutenant General He Chen licks his wounds. The Devil Dragon project lies in ruins, thanks to the heroics of US Air Force Reserve Captain Ford Stevens and Stevens's best friend, pilot Wu Lee. But now Lee is gone, and as Stevens mourns the loss of his friend, Chen works to complete his second spy plane, codenamed Black Scorpion.
-
The Black Scorpion Pilot
- A Ford Stevens Military-Aviation Thriller, Volume 2
- Narrateur(s): Christopher Raab
- Série: Ford Stevens Military-Aviation Thrillers, Livre 2
- Durée: 9 h et 19 min
- Date de publication: 2019-05-29
- Langue: Anglais
-
In a hidden base in China, Lieutenant General He Chen licks his wounds. The Devil Dragon project lies in ruins, thanks to the heroics of US Air Force Reserve Captain Ford Stevens and Stevens's best friend, pilot Wu Lee....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Auteur(s): Cybersecurity Bookstore
- Narrateur(s): Will Davidson
- Durée: 2 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security. The book is divided into eight chapters that cover various aspects of IT security and provide practical guidance on how to secure your organization's data and systems.
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Narrateur(s): Will Davidson
- Durée: 2 h
- Date de publication: 2023-10-24
- Langue: Anglais
-
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Jobs Resume Marketing
- Find Cybersecurity Jobs, Book 1
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 2 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
According to the White House, there are 700,000 cybersecurity positions open today. Using the techniques in this audiobook, you can be a part of one of the fastest, highest salary career paths in IT.
-
Cybersecurity Jobs Resume Marketing
- Find Cybersecurity Jobs, Book 1
- Narrateur(s): Frank Block
- Série: Find Cybersecurity Jobs, Livre 1
- Durée: 2 h et 23 min
- Date de publication: 2022-11-11
- Langue: Anglais
-
According to the White House, there are 700,000 cybersecurity positions open today. Using the techniques in this audiobook, you can be a part of one of the fastest, highest salary career paths in IT....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity and Privacy Law Introduction
- Auteur(s): Convocourses
- Narrateur(s): Kim Pepper
- Durée: 3 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice.
-
Cybersecurity and Privacy Law Introduction
- Narrateur(s): Kim Pepper
- Durée: 3 h et 13 min
- Date de publication: 2024-02-22
- Langue: Anglais
-
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital Downfall
- Technology, Cyberattacks and the End of the American Republic
- Auteur(s): Hugh Taylor
- Narrateur(s): Robbie Smith
- Durée: 6 h et 45 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is America on the brink of civil war? Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict? What would happen if the lights went out and the technology we rely upon to run American life is no longer available? The present dangers are real. The US is more vulnerable to destructive foreign interference today than it has been in over a century. As Russia and China realize they can’t win shooting wars against the US, they have devised new and cunning ways to destabilize American politics and cripple the US economy.
-
Digital Downfall
- Technology, Cyberattacks and the End of the American Republic
- Narrateur(s): Robbie Smith
- Durée: 6 h et 45 min
- Date de publication: 2020-08-20
- Langue: Anglais
-
Is America on the brink of civil war? Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict? What would happen if the lights went out and the technology we rely upon to run American life is no longer available? The present dangers are real....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Google Archipelago: The Digital Gulag and the Simulation of Freedom
- Auteur(s): Michael Rectenwald
- Narrateur(s): William Williams
- Durée: 4 h et 56 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Google Archipelago: The Digital Gulag and the Simulation of Freedom explores the reach, penetration, power, and impact of Big Digital or the mega-information managers, social media platforms, Artificial Intelligence developers, providers of other web applications and functionalities, and the architects and proponents of the promised Internet of Things.
-
Google Archipelago: The Digital Gulag and the Simulation of Freedom
- Narrateur(s): William Williams
- Durée: 4 h et 56 min
- Date de publication: 2019-11-21
- Langue: Anglais
-
Google Archipelago: The Digital Gulag and the Simulation of Freedom explores the reach, penetration, power, and impact of Big Digital or the mega-information managers, social media platforms, Artificial Intelligence developers, providers of other web applications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Beginners Made Easy
- Navigate the Digital Maze With Simple Steps, Real-World Solutions, and Expert Insights to Safeguard Your Online Presence
- Auteur(s): Raiden Tekk
- Narrateur(s): Ben Staab
- Durée: 3 h et 56 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Arm yourself with cybersecurity knowledge and skills to stay safe, informed, and empowered in the digital age. Are you concerned about privacy and cyber attacks in an increasingly complex virtual space? Does integrating cybersecurity solutions into your business seem endlessly daunting and complicated? If so, know you can do plenty to identify, mitigate, and avoid cyber risks. And this book will help you get the ball rolling. It features the powerful SECURE IT framework for simplifying even the most complicated concepts.
-
Cybersecurity for Beginners Made Easy
- Navigate the Digital Maze With Simple Steps, Real-World Solutions, and Expert Insights to Safeguard Your Online Presence
- Narrateur(s): Ben Staab
- Durée: 3 h et 56 min
- Date de publication: 2025-01-13
- Langue: Anglais
-
Arm yourself with cybersecurity knowledge and skills to stay safe, informed, and empowered in the digital age.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-