Computer Security
-
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- Auteur(s): Kim Crawley
- Narrateur(s): Jo Anna Perrin
- Durée: 7 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical road map to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- Narrateur(s): Jo Anna Perrin
- Durée: 7 h et 49 min
- Date de publication: 2021-10-26
- Langue: Anglais
-
Harden your business against internal and external cybersecurity threats with a single accessible resource....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,96 $ ou gratuit avec l'essai de 30 jours
-
-
-
To Save Everything, Click Here
- The Folly of Technological Solutionism
- Auteur(s): Evgeny Morozov
- Narrateur(s): Stephen Hoye
- Durée: 15 h et 59 min
- Version intégrale
-
Au global5
-
Performance4
-
Histoire3
In the very near future, smart “technologies and big data” will allow us to make large-scale and sophisticated interventions in politics, culture, and everyday life. Technology will allow us to solve problems in highly original ways and create new incentives to get more people to do the right thing. But how will such “solutionism” affect our society, once deeply political, moral, and irresolvable dilemmas are recast as uncontroversial and easily manageable matters of technological efficiency?
-
-
I will not think about solutions as I had before
- Écrit par Wendy le 2019-05-19
-
To Save Everything, Click Here
- The Folly of Technological Solutionism
- Narrateur(s): Stephen Hoye
- Durée: 15 h et 59 min
- Date de publication: 2013-12-17
- Langue: Anglais
- In the very near future, smart technologies and big data will allow us to make large-scale and sophisticated interventions in politics, culture, and everyday life....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,46 $ ou gratuit avec l'essai de 30 jours
-
-
-
Engaging with Artificial Intelligence (AI)
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The purpose of this publication is to provide organisations with guidance on how to use AI systems securely. The audio summarises some important threats related to AI systems and prompts organisations to consider steps they can take to engage with AI while managing risk. It provides mitigations to assist both organisations that use self-hosted and third-party hosted AI systems. The guidance within this publication is focused on using AI systems securely rather than developing secure AI systems.
-
Engaging with Artificial Intelligence (AI)
- Narrateur(s): Tom Brooks
- Durée: 1 h et 6 min
- Date de publication: 2024-02-05
- Langue: Anglais
-
The purpose of this publication is to provide organisations with guidance on how to use AI systems securely. The audio summarises some important threats related to AI systems and prompts organisations to consider steps they can take to engage with AI while managing risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
9,77 $ ou gratuit avec l'essai de 30 jours
-
-
-
Tips for: Securing the Software Supply Chain
- Recommended Practices for Managing Open-Source Software and Software Bill of Materials
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 45 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Unmitigated vulnerabilities in the software supply chain continue to pose a significant risk to organizations and our nation. This paper builds on the previously released Recommended Practices Guide for a software supply chain’s development, production and distribution, and management processes, to further increase the resiliency of these processes against compromise.
-
Tips for: Securing the Software Supply Chain
- Recommended Practices for Managing Open-Source Software and Software Bill of Materials
- Narrateur(s): Tom Brooks
- Durée: 3 h et 45 min
- Date de publication: 2023-12-20
- Langue: Anglais
-
Unmitigated vulnerabilities in the software supply chain continue to pose a significant risk to organizations and our nation....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,33 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Entrepreneur’s Edge
- A 3-Book Compilation on AI, Cybersecurity, and AR/VR (Empowering Small Businesses)
- Auteur(s): Kimberly Burk Cordova
- Narrateur(s): Hannah Stone
- Durée: 9 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Entrepreneur's Edge is the ultimate guide for small business owners and entrepreneurs who want to harness the power of artificial intelligence, cybersecurity, and augmented/virtual reality to fuel growth and innovation. This all-in-one resource equips you with the knowledge and tools to navigate these transformative technologies with confidence.
-
The Entrepreneur’s Edge
- A 3-Book Compilation on AI, Cybersecurity, and AR/VR (Empowering Small Businesses)
- Narrateur(s): Hannah Stone
- Durée: 9 h et 29 min
- Date de publication: 2024-07-22
- Langue: Anglais
-
The Entrepreneur's Edge is the ultimate guide for small business owners and entrepreneurs who want to harness the power of artificial intelligence, cybersecurity, and augmented/virtual reality to fuel growth and innovation.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,58 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Auteur(s): Aram Sinnreich, Jesse Gilbert
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Date de publication: 2024-04-30
- Langue: Anglais
-
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,25 $ ou gratuit avec l'essai de 30 jours
-
-
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Date de publication: 2024-05-28
- Langue: Anglais
-
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,56 $ ou gratuit avec l'essai de 30 jours
-
-
-
Jump-Start Your SOC Analyst Career
- A Roadmap to Cybersecurity Success
- Auteur(s): Tyler Wall, Jarrett Rodrick
- Narrateur(s): Stu Summers
- Durée: 4 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book. Authors Tyler E. Wall and Jarrett W. Rodrick carefully and expertly share real-world insights and practical tips in Jump-start Your SOC Analyst Career. The lessons revealed equip you for interview preparation, tackling day one on the job, and setting long-term development goals.
-
Jump-Start Your SOC Analyst Career
- A Roadmap to Cybersecurity Success
- Narrateur(s): Stu Summers
- Durée: 4 h et 59 min
- Date de publication: 2024-08-07
- Langue: Anglais
-
A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
16,76 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Crucial Role of IT Governance and Compliance in Healthcare
- Auteur(s): Tony R. Hutton
- Narrateur(s): Jimmy Alli
- Durée: 2 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In our digital age, where threats can come from any corner of the globe and impact businesses of all sizes, I believe in a proactive, multi-layered approach. I am passionate about empowering businesses and individuals to understand cyber risks. Effective IT governance establishes frameworks that guide decision-making, risk management, and resource allocation to support high-quality care while safeguarding patient data. Compliance helps mitigate threats, enhance operational efficiency, and maintain the integrity and confidentiality of healthcare data.
-
The Crucial Role of IT Governance and Compliance in Healthcare
- Narrateur(s): Jimmy Alli
- Durée: 2 h et 49 min
- Date de publication: 2026-01-27
- Langue: Anglais
-
In our digital age, where threats can come from any corner of the globe and impact businesses of all sizes, I believe in a proactive, multi-layered approach. I am passionate about empowering businesses and individuals to understand cyber risks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Auteur(s): Ed Adams
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Date de publication: 2024-03-26
- Langue: Anglais
-
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization can contribute to improving its cybersecurity backbone.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,33 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Blockchain Innovator's Handbook
- A Leader's Guide to Understanding, Adopting and Succeeding with This Disruptive Technology
- Auteur(s): Conor Svensson
- Narrateur(s): Conor Svensson, Leyla Hart-Svensson, Raoul Pal
- Durée: 4 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Are you struggling to understand what blockchain technology does and how it can benefit your business? "The Blockchain Innovator's Handbook" is an accessible guide for leaders. It covers everything from opportunity identification to implementation and shows how to unlock new business opportunities in a fast-changing environment.
-
The Blockchain Innovator's Handbook
- A Leader's Guide to Understanding, Adopting and Succeeding with This Disruptive Technology
- Narrateur(s): Conor Svensson, Leyla Hart-Svensson, Raoul Pal
- Durée: 4 h et 49 min
- Date de publication: 2023-03-29
- Langue: Anglais
-
Are you struggling to understand what blockchain technology does and how it can benefit your business? "The Blockchain Innovator's Handbook" is an...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
16,76 $ ou gratuit avec l'essai de 30 jours
-
-
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- Auteur(s): Taimur Ijlal
- Narrateur(s): Scott Mandeville
- Durée: 4 h et 57 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Dive into the dynamic world of cybersecurity with the 'CompTIA Security+ Revision Guide'. This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals. Learn about the unique risks in the digital realm, develop a robust security framework, and understand the intricacies of cybersecurity in various systems. This book is crafted for easy comprehension, requiring no prior expertise in cybersecurity or programming.
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- Narrateur(s): Scott Mandeville
- Durée: 4 h et 57 min
- Date de publication: 2024-02-28
- Langue: Anglais
-
This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
16,76 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Dark Web and Scams
- A Guide for Personal Cybersecurity
- Auteur(s): Ivette Smith
- Narrateur(s): Mike Martinez
- Durée: 4 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Dark Web and Scams by Ivette Ibarra Smith is an in-depth guide to understanding the dark web and various cyber scams, aiming to improve personal cybersecurity. The book covers several topics, starting with an exploration of the dark web—demystifying its role as both a space for illegal activities and a haven for privacy-focused individuals such as journalists and whistleblowers.
-
The Dark Web and Scams
- A Guide for Personal Cybersecurity
- Narrateur(s): Mike Martinez
- Durée: 4 h et 5 min
- Date de publication: 2025-03-10
- Langue: Anglais
-
The Dark Web and Scams by Ivette Ibarra Smith is an in-depth guide to understanding the dark web and various cyber scams, aiming to improve personal cybersecurity.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
16,44 $ ou gratuit avec l'essai de 30 jours
-
-
-
Reclaim Your Digital Gold
- How Your Personal Data Is Changing Business
- Auteur(s): Wayne Hinds
- Narrateur(s): Curt Caster
- Durée: 4 h et 35 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
By understanding the profound power of personal data, listeners can take control of their digital lives, safeguard their privacy, and navigate the digital landscape with confidence. Empower yourself with knowledge. Get your copy of the book today to discover the transformative power of personal data and take control of your digital life.
-
-
Informative
- Écrit par Thomas Donovan le 2025-02-16
-
Reclaim Your Digital Gold
- How Your Personal Data Is Changing Business
- Narrateur(s): Curt Caster
- Durée: 4 h et 35 min
- Date de publication: 2025-02-13
- Langue: Anglais
-
By understanding the profound power of personal data, listeners can take control of their digital lives, safeguard their privacy, and navigate the digital landscape with confidence. Empower yourself with knowledge.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
16,76 $ ou gratuit avec l'essai de 30 jours
-
-
-
Step-by-Step Cyber Security for Beginners
- A Practical Guide to Understanding Threats. Protecting Yourself and Your Devices in the Digital Age
- Auteur(s): Ethan Ward
- Narrateur(s): Aaron Sinn
- Durée: 4 h et 34 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In simple and easy-to-understand language, this book provides you with the knowledge and tools to recognize and counteract cyber threats, helping you navigate the digital world with confidence and security.
-
Step-by-Step Cyber Security for Beginners
- A Practical Guide to Understanding Threats. Protecting Yourself and Your Devices in the Digital Age
- Narrateur(s): Aaron Sinn
- Durée: 4 h et 34 min
- Date de publication: 2024-12-12
- Langue: Anglais
-
In simple and easy-to-understand language, this book provides you with the knowledge and tools to recognize and counteract cyber threats, helping you navigate the digital world with confidence and security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
16,76 $ ou gratuit avec l'essai de 30 jours
-
-
-
Developer and Vendor Challenges Identity and Access Management
- Auteur(s): National Security Agency (NSA), Infrastructure Security Agency (CISA)
- Narrateur(s): Tom Brooks
- Durée: 2 h et 20 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Since the introduction of multi-user computer systems, user authentication has primarily relied on the use of usernames and passwords. To strengthen the authentication process, Multi-Factor Authentication (MFA) requires the user to present multiple elements in different categories, or “factors,” as part of an authentication attempt. These factors are something you have, something you know, and something you are.
-
Developer and Vendor Challenges Identity and Access Management
- Narrateur(s): Tom Brooks
- Durée: 2 h et 20 min
- Date de publication: 2023-10-16
- Langue: Anglais
-
Since the introduction of multi-user computer systems, user authentication has primarily relied on the use of usernames and passwords....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
12,37 $ ou gratuit avec l'essai de 30 jours
-
-
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- Auteur(s): Omar Santos, Petar Radanliev
- Narrateur(s): Max Newland
- Durée: 11 h et 35 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- Narrateur(s): Max Newland
- Durée: 11 h et 35 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
As artificial intelligence becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,38 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Smart
- Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
- Auteur(s): Bart R. McDonough
- Narrateur(s): Kyle Tait
- Durée: 10 h et 34 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret.
-
Cyber Smart
- Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
- Narrateur(s): Kyle Tait
- Durée: 10 h et 34 min
- Date de publication: 2019-02-19
- Langue: Anglais
-
The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,25 $ ou gratuit avec l'essai de 30 jours
-
-
-
Python Machine Learning Guide for Beginners & Intermediates: The Future Is Here!
- Auteur(s): William Sullivan
- Narrateur(s): Lukas Arnold
- Durée: 2 h et 30 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
If you want to learn more about Python machine learning, it is highly recommended you start from the ground up by using this audiobook.
-
Python Machine Learning Guide for Beginners & Intermediates: The Future Is Here!
- Narrateur(s): Lukas Arnold
- Durée: 2 h et 30 min
- Date de publication: 2018-08-23
- Langue: Anglais
-
If you want to learn more about Python machine learning, it is highly recommended you start from the ground up by using this audiobook....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,83 $ ou gratuit avec l'essai de 30 jours
-