Computer Security
-
-
CompTIA Network Crash Course
- A Concise Simplified Summary of What You Need to Know to Pass the CompTIA Network+ Exam with Flying Colors (Official Test Prep for 2025-2026)
- Auteur(s): William James
- Narrateur(s): Alex Lindstrom
- Durée: 11 h et 18 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Are you prepared to ace the CompTIA Network+ test and have a great time doing it? There's nowhere else to look! We are pleased to present the "CompTIA Network Crash Course," the only study aid you will require to ace the CompTIA exam. Get rid of the boring, textbook-style materials that make you feel sleepy. We keep things light and fun with lots of colorful explanations, astute observations, and a hint of comedy throughout our book.
-
CompTIA Network Crash Course
- A Concise Simplified Summary of What You Need to Know to Pass the CompTIA Network+ Exam with Flying Colors (Official Test Prep for 2025-2026)
- Narrateur(s): Alex Lindstrom
- Durée: 11 h et 18 min
- Date de publication: 2025-03-03
- Langue: Anglais
-
Are you prepared to ace the CompTIA Network+ test and have a great time doing it? There's nowhere else to look! We are pleased to present the "CompTIA Network Crash Course," the only study aid you will require to ace the CompTIA exam.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,27 $ ou gratuit avec l'essai de 30 jours
-
-
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Auteur(s): George Finney, John Kindervag - foreword
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Date de publication: 2022-10-04
- Langue: Anglais
-
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Auteur(s): Jennifer Bleam
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
What value does managed security bring when there’s no way to promise ROI? How do you convince small business owners to part with their hard-earned revenue when they don’t feel vulnerable to a cyberattack? What is the best way to mitigate your clients’ risk without feeling dishonest or using slimy sales tactics? And could someone please demystify sales and make it easy? This book is the answer to all those questions and more. Forged in the steel of real-world MSP successes and failures, you’ll learn how to sell cybersecurity, simply and easily—even for the techiest tech in the industry.
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Date de publication: 2023-09-18
- Langue: Anglais
- Cybersécurité · Marketing et ventes
-
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
NIST Cybersecurity Framework (CSF) for Information Systems Security
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 8 h et 25 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The NIST Cybersecurity Framework, intelligently designed to synchronize with top-tier industry practices, is a treasure trove for all cybersecurity enthusiasts, IT professionals, or organizational leaders determined to enhance their information systems security. This book, with its ability to translate complex concepts into accessible lessons, has the power to elevate beginners into adept cybersecurity practitioners.
-
NIST Cybersecurity Framework (CSF) for Information Systems Security
- Narrateur(s): Kim Pepper
- Série: NIST Cybersecurity Framework, Livre 1
- Durée: 8 h et 25 min
- Date de publication: 2023-08-09
- Langue: Anglais
- Cybersécurité
-
The NIST Cybersecurity Framework, intelligently designed to synchronize with top-tier industry practices, is a treasure trove for all cybersecurity enthusiasts, IT professionals, or organizational leaders determined to enhance their information systems security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global76
-
Performance59
-
Histoire59
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true...
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Date de publication: 2019-11-05
- Langue: Anglais
- Espionnage · Armée et guerre · Militaire
- "With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
Real-World Cryptography
- Auteur(s): David Wong
- Narrateur(s): Derek Dysart
- Durée: 13 h et 49 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging. This audiobook is a joy to listen to - and it might just save your bacon the next time you’re targeted by an adversary after your data.
-
Real-World Cryptography
- Narrateur(s): Derek Dysart
- Durée: 13 h et 49 min
- Date de publication: 2021-12-08
- Langue: Anglais
- Cryptage · Cryptomonnaie
-
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 19 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments. From concepts to advanced techniques, this book offers a structured and accessible approach to understanding the nuances of cloud security.
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 19 min
- Date de publication: 2024-04-16
- Langue: Anglais
-
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- Auteur(s): Ben Buchanan
- Narrateur(s): Christopher Grove
- Durée: 11 h et 19 min
- Version intégrale
-
Au global9
-
Performance7
-
Histoire7
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
Very informative
- Écrit par Kolcza Gabor le 2025-02-23
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- Narrateur(s): Christopher Grove
- Durée: 11 h et 19 min
- Date de publication: 2020-06-30
- Langue: Anglais
- Espionnage · Liberté et sécurité
-
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
LikeWar
- The Weaponization of Social Media
- Auteur(s): P. W. Singer, Emerson T. Brooking
- Narrateur(s): George Guidall
- Durée: 11 h et 21 min
- Version intégrale
-
Au global17
-
Performance13
-
Histoire13
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the Internet is changing war and politics, just as war and politics are changing the Internet. Terrorists livestream their attacks, “Twitter wars” produce real world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones.
-
-
Great read
- Écrit par P. M. le 2019-12-13
-
LikeWar
- The Weaponization of Social Media
- Narrateur(s): George Guidall
- Durée: 11 h et 21 min
- Date de publication: 2018-10-02
- Langue: Anglais
- Militaire · Guerre et crise
-
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the Internet is changing war and politics, just as war and politics are changing the Internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
28,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Social Engineering
- The Art of Human Hacking
- Auteur(s): Paul Wilson - foreword, Christopher Hadnagy
- Narrateur(s): A. T. Chandler
- Durée: 14 h et 52 min
- Version intégrale
-
Au global6
-
Performance4
-
Histoire4
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
-
Social Engineering
- The Art of Human Hacking
- Narrateur(s): A. T. Chandler
- Durée: 14 h et 52 min
- Date de publication: 2020-07-10
- Langue: Anglais
- Histoire et culture
-
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Auteur(s): Lance Henderson
- Narrateur(s): James C. Lewis
- Durée: 12 h et 57 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Nothing about Kali Linux
- Écrit par Utilisateur anonyme le 2020-01-11
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Narrateur(s): James C. Lewis
- Durée: 12 h et 57 min
- Date de publication: 2018-06-07
- Langue: Anglais
- Cryptomonnaie · Ingénierie · Éducation
-
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Signals in the Noise
- Security, Technology, and the Hidden Patterns of Modern Risk
- Auteur(s): Timothy E. Reed
- Narrateur(s): Luke Oldham
- Durée: 4 h et 47 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Signals in the Noise: Security, Technology, and the Hidden Patterns of Modern Risk examines how clarity, judgment, and human discernment can survive in an age dominated by algorithms and information overload. Drawing on lessons from intelligence tradecraft, behavioral science, and crisis management, Reed explores how modern organizations can recover the habits of mind that once defined strategic thinking.
-
Signals in the Noise
- Security, Technology, and the Hidden Patterns of Modern Risk
- Narrateur(s): Luke Oldham
- Durée: 4 h et 47 min
- Date de publication: 2026-01-13
- Langue: Anglais
- Entrepreneurship · Gestion et leadership
-
Signals in the Noise: Security, Technology, and the Hidden Patterns of Modern Risk examines how clarity, judgment, and human discernment can survive in an age dominated by algorithms and information overload.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global53
-
Performance45
-
Histoire45
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Date de publication: 2014-11-11
- Langue: Anglais
- Espionnage · Armes et guerre
- A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- Auteur(s): Phil Martin
- Narrateur(s): Phil Martin
- Durée: 17 h
- Version intégrale
-
Au global10
-
Performance7
-
Histoire7
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. Many books have tried to simplify this but fail to leave behind the $100 words and run-on sentences. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire official study guide and breaks it down into easy-to-absorb chapters with simple language. Tons of examples are included to drive the points home in a way that makes it effortless to remember.
-
-
Great book, not great narration
- Écrit par Amazon Customer le 2019-02-14
-
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
- Narrateur(s): Phil Martin
- Durée: 17 h
- Date de publication: 2018-10-17
- Langue: Anglais
- Gestion des risques · Logiciel · Informatique
-
The CISSP certification is the gold standard for security professionals, but ISC2‘s official study guide is anything but easy to read. An update to the original Simple CISSP book, Essential CISSP Exam Guide takes the entire study guide and breaks it into easy-to-absorb chapters....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Voices for Justice
- How Ordinary People Drive Change in a Digital World (Voices for Justice Series, Book 1)
- Auteur(s): Dylan Stone
- Narrateur(s): Aidan Owens
- Durée: 54 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Voices for Justice is an educational guide to digital citizenship, media literacy, and peaceful civic engagement in the modern internet age. In a world where headlines spread faster than facts, this book helps listeners understand how online narratives form, how reputations can be shaped overnight, and how ordinary people can respond responsibly—without hate, harassment, or misinformation.
-
Voices for Justice
- How Ordinary People Drive Change in a Digital World (Voices for Justice Series, Book 1)
- Narrateur(s): Aidan Owens
- Durée: 54 min
- Date de publication: 2026-01-23
- Langue: Anglais
-
Voices for Justice is an educational guide to digital citizenship, media literacy, and peaceful civic engagement in the modern internet age.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Defend Your Data: Cybersecurity Essentials for Everyone
- Practical Steps to Protect Your Digital Life and Safeguard Your Data
- Auteur(s): Ousmane Barry
- Narrateur(s): Snake Porter
- Durée: 3 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Defend Your Data is a practical guide for anyone who wants to feel more confident and secure in the digital world. It walks you through the threats most people face today, why they work, and how to defend yourself with simple habits that make a real difference. You’ll learn how phishing, malware, ransomware, and social-engineering attacks actually unfold, and what steps you can take to protect your devices, accounts, home network, and personal information. The book breaks down complex ideas in a way that feels approachable, even if you don’t work in technology.
-
Defend Your Data: Cybersecurity Essentials for Everyone
- Practical Steps to Protect Your Digital Life and Safeguard Your Data
- Narrateur(s): Snake Porter
- Durée: 3 h et 59 min
- Date de publication: 2026-01-05
- Langue: Anglais
- Informatique · Réussite
-
Defend Your Data is a practical guide for anyone who wants to feel more confident and secure in the digital world. It walks you through the threats most people face today, why they work, and how to defend yourself with simple habits that make a real difference.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- Auteur(s): Jeremiah Talamantes
- Narrateur(s): Joe Smith
- Durée: 4 h et 18 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration. Learn how to conduct a Physical Red Team Operation with precision, confidence, and value. Whether the listener will be hired at some point to penetrate security or simply trying to harden his or her own defenses, this audiobook is essential.
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- Narrateur(s): Joe Smith
- Durée: 4 h et 18 min
- Date de publication: 2019-12-10
- Langue: Anglais
- Cryptage
-
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
On Privacy and Technology
- Auteur(s): Daniel J. Solove
- Narrateur(s): Jonathan Todd Ross
- Durée: 4 h et 30 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Internationally renowned privacy expert Daniel J. Solove draws from a range of fields, from law to philosophy to the humanities, to illustrate the profound changes technology is wreaking upon our privacy, why they matter, and what can be done about them. Solove provides incisive examinations of key concepts in the digital sphere, including control, manipulation, harm, automation, reputation, consent, prediction, inference, and many others.
-
On Privacy and Technology
- Narrateur(s): Jonathan Todd Ross
- Durée: 4 h et 30 min
- Date de publication: 2025-03-25
- Langue: Anglais
- Droit · Histoire et culture
-
Succinct and eloquent, On Privacy and Technology is an essential primer on how to face the threats to privacy in today's age of digital technologies and AI.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,47 $ ou gratuit avec l'essai de 30 jours
-
-
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- Auteur(s): Byron Tau
- Narrateur(s): Sean Patrick Hopkins
- Durée: 11 h et 6 min
- Version intégrale
-
Au global5
-
Performance3
-
Histoire3
You are being surveilled right now. This sweeping exposé reveals how the U.S. government allied with data brokers, tech companies, and advertisers to monitor us through the phones we carry and the devices in our home. “A revealing . . . startling . . . timely . . . fascinating, sometimes...
-
-
Not objective
- Écrit par Julie le 2025-11-26
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- Narrateur(s): Sean Patrick Hopkins
- Durée: 11 h et 6 min
- Date de publication: 2024-02-27
- Langue: Anglais
- Sciences sociales
- You are being surveilled right now. This sweeping exposé reveals how the U.S. government allied with data brokers, tech companies, and advertisers to monitor us through the phones we carry and the devices in our home. “A revealing . . . startling . . . timely . . . fascinating, sometimes...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Date de publication: 2024-03-06
- Langue: Anglais
- Droit
-
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-