Computer Security
-
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 19 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments. From concepts to advanced techniques, this book offers a structured and accessible approach to understanding the nuances of cloud security.
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 19 min
- Date de publication: 2024-04-16
- Langue: Anglais
-
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Breaking and Entering
- The Extraordinary Story of a Hacker Called "Alien"
- Auteur(s): Jeremy N. Smith
- Narrateur(s): Jonathan Todd Ross
- Durée: 12 h et 4 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
When she arrived at MIT in the 1990s, Alien wanted to study aerospace engineering, but she was soon drawn to the school’s venerable tradition of high-risk physical trespassing: the original “hacking”. Within a year, one of her hallmates was dead, two others were on trial, and two had been institutionalized. Alien’s adventures were only just beginning.
-
Breaking and Entering
- The Extraordinary Story of a Hacker Called "Alien"
- Narrateur(s): Jonathan Todd Ross
- Durée: 12 h et 4 min
- Date de publication: 2019-01-08
- Langue: Anglais
-
This taut, true thriller takes a deep dive into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
28,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- Auteur(s): Douglas W. Hubbard, Richard Seiersen
- Narrateur(s): Jim Seybert
- Durée: 14 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- Narrateur(s): Jim Seybert
- Durée: 14 h et 5 min
- Date de publication: 2023-04-25
- Langue: Anglais
-
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Standardized
- The MSP’s Guide to Avoiding Lawsuits, Scaling Compliance, and Winning High-Value Clients
- Auteur(s): Bruce McCully
- Narrateur(s): Bruce McCully
- Durée: 4 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The MSPs that are dominating the market aren’t selling IT anymore. They’re selling protection—protection from regulators, cyber insurance denials, and lawsuits that are wiping out businesses like yours. Standardized: The MSP’s Guide to Avoiding Lawsuits, Scaling Compliance, and Winning High-Value Clients isn’t theory—it’s a battle-tested blueprint for turning compliance into a scalable, profitable service that keeps clients loyal and lawyers off your back.
-
Standardized
- The MSP’s Guide to Avoiding Lawsuits, Scaling Compliance, and Winning High-Value Clients
- Narrateur(s): Bruce McCully
- Durée: 4 h et 6 min
- Date de publication: 2025-07-10
- Langue: Anglais
-
If you think compliance is a checkbox, you’ve already lost. If you’re still leading with security tools, you’re just another expense.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Essentials
- Auteur(s): Charles J. Brooks, Christopher Grow, Philip Craig, Autres
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Awful as an e-book
- Écrit par Mac le 2021-07-25
-
Cybersecurity Essentials
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Date de publication: 2018-10-30
- Langue: Anglais
-
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global53
-
Performance45
-
Histoire45
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Date de publication: 2014-11-11
- Langue: Anglais
- A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Auteur(s): Anthony Hack
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you. This audiobook includes: SQL Computer Programming for Beginners, Python for Beginners, Kali Linux and Hacking with Kali Linux.
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Date de publication: 2020-09-18
- Langue: Anglais
-
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- Auteur(s): Perry Carpenter, Kevin Mitnick - foreword
- Narrateur(s): Stephen Bel Davies
- Durée: 12 h et 20 min
- Version intégrale
-
Au global4
-
Performance4
-
Histoire4
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good book but....
- Écrit par Anonymous le 2025-07-04
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- Narrateur(s): Stephen Bel Davies
- Durée: 12 h et 20 min
- Date de publication: 2020-07-21
- Langue: Anglais
-
Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness training programs that drive secure behaviors and culture change....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Auteur(s): Roger A. Grimes
- Narrateur(s): Mike Lenz
- Durée: 13 h et 30 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Narrateur(s): Mike Lenz
- Durée: 13 h et 30 min
- Date de publication: 2025-07-01
- Langue: Anglais
-
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- Auteur(s): Roger A. Grimes
- Narrateur(s): Jonathan Todd Ross
- Durée: 10 h et 46 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- Narrateur(s): Jonathan Todd Ross
- Durée: 10 h et 46 min
- Date de publication: 2019-10-08
- Langue: Anglais
-
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Fundamentals
- Governance Risk & Compliance (GRC) (Cybersecurity Beginner, Book 2)
- Auteur(s): Bruce Brown
- Narrateur(s): Kevin Howard
- Durée: 3 h et 16 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Discover the Secrets of Cybersecurity Governance, Risk, and Compliance with Cybersecurity Fundamentals: Governance, Risk & Compliance by Bruce Brown, CISSP, CGRC. In the ever-evolving world of cybersecurity, understanding the intricacies of Governance, Risk, and Compliance (GRC) is not just beneficial—it's essential. Despite being one of the most crucial areas in cybersecurity, GRC is often overlooked, leaving many professionals unprepared for the challenges ahead. This book changes that narrative.
-
Cybersecurity Fundamentals
- Governance Risk & Compliance (GRC) (Cybersecurity Beginner, Book 2)
- Narrateur(s): Kevin Howard
- Série: Cybersecurity Beginner, Livre 2
- Durée: 3 h et 16 min
- Date de publication: 2024-10-03
- Langue: Anglais
-
Discover the Secrets of Cybersecurity Governance, Risk, and Compliance with Cybersecurity Fundamentals: Governance, Risk & Compliance by Bruce Brown, CISSP, CGRC.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Date de publication: 2024-03-06
- Langue: Anglais
-
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Auteur(s): Kelly Shortridge, Aaron Rinehart - contributor
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
-
-
Great content but horribly annoying computer voice
- Écrit par Utilisateur anonyme le 2024-04-08
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Date de publication: 2023-11-28
- Langue: Anglais
-
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
33,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Date de publication: 2024-05-28
- Langue: Anglais
-
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- Auteur(s): Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrateur(s): Rich Boniface
- Durée: 15 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- Narrateur(s): Rich Boniface
- Durée: 15 h et 8 min
- Date de publication: 2024-04-26
- Langue: Anglais
-
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,27 $ ou gratuit avec l'essai de 30 jours
-
-
-
How I Rob Banks
- And Other Such Places
- Auteur(s): FC
- Narrateur(s): Paul Brion
- Durée: 7 h et 5 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
In How I Rob Banks: And Other Such Places, renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. In the book, you'll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes.
-
-
Fantastic stories and amazing security tips
- Écrit par Audiobook-Enthusiast le 2023-07-26
-
How I Rob Banks
- And Other Such Places
- Narrateur(s): Paul Brion
- Durée: 7 h et 5 min
- Date de publication: 2023-06-27
- Langue: Anglais
-
Renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- Auteur(s): Razi Rais, Christina Morillo, Evan Gilman, Autres
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 5 min
- Date de publication: 2024-06-04
- Langue: Anglais
-
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- Auteur(s): Steven Levy
- Narrateur(s): Rich Miller
- Durée: 14 h et 2 min
- Version intégrale
-
Au global8
-
Performance6
-
Histoire6
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- Narrateur(s): Rich Miller
- Durée: 14 h et 2 min
- Date de publication: 2021-04-27
- Langue: Anglais
-
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that affects every citizen in the 21st century....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Developer's Playbook for Large Language Model Security
- Building Secure AI Applications
- Auteur(s): Steve Wilson
- Narrateur(s): Jonathan Yen
- Durée: 8 h et 27 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models.
-
The Developer's Playbook for Large Language Model Security
- Building Secure AI Applications
- Narrateur(s): Jonathan Yen
- Durée: 8 h et 27 min
- Date de publication: 2025-05-13
- Langue: Anglais
-
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Lights Out
- A Cyberattack, A Nation Unprepared, Surviving the Aftermath
- Auteur(s): Ted Koppel
- Narrateur(s): Ted Koppel
- Durée: 8 h et 10 min
- Version intégrale
-
Au global9
-
Performance7
-
Histoire7
NEW YORK TIMES BESTSELLER Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared. “Fascinating, frightening, and beyond timely.”—Anderson Cooper Imagine a...
-
-
Beautifully read... ASTOUNDINGLY RESEARCHED!!!!!
- Écrit par Q le 2019-03-15
-
Lights Out
- A Cyberattack, A Nation Unprepared, Surviving the Aftermath
- Narrateur(s): Ted Koppel
- Durée: 8 h et 10 min
- Date de publication: 2015-10-27
- Langue: Anglais
- NEW YORK TIMES BESTSELLER Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared. “Fascinating, frightening, and beyond timely.”—Anderson Cooper Imagine a...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,31 $ ou gratuit avec l'essai de 30 jours
-