Computer Security
-
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- Auteur(s): Razi Rais, Christina Morillo, Evan Gilman, Autres
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 5 min
- Date de publication: 2024-06-04
- Langue: Anglais
-
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92 $
-
-
-
The Future of Violence
- Robots and Germs, Hackers and Drones - Confronting a New Age of Threat
- Auteur(s): Benjamin Wittes, Gabriella Blum
- Narrateur(s): Tom Weiner
- Durée: 11 h et 54 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
From drone warfare in the Middle East to digital spying by the National Security Agency, the US government has harnessed the power of cutting-edge technology to awesome effect. But what happens when ordinary people have the same tools at their fingertips? Advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to potentially dangerous technologies that could be used to attack states and private citizens alike.
-
The Future of Violence
- Robots and Germs, Hackers and Drones - Confronting a New Age of Threat
- Narrateur(s): Tom Weiner
- Durée: 11 h et 54 min
- Date de publication: 2015-03-10
- Langue: Anglais
- From drone warfare in the Middle East to digital spying by the National Security Agency, the US government has harnessed the power of cutting-edge technology to awesome effect....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,50 $
-
-
-
@War
- The Rise of the Military-Internet Complex
- Auteur(s): Shane Harris
- Narrateur(s): Stephen R. Thorne
- Durée: 9 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
Eye opening
- Écrit par Etha le 2022-08-02
-
@War
- The Rise of the Military-Internet Complex
- Narrateur(s): Stephen R. Thorne
- Durée: 9 h et 43 min
- Date de publication: 2014-11-11
- Langue: Anglais
- The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 24,69 $
-
-
-
Wealthcare
- Demystifying Web3 and the Rise of Personal Data Economies
- Auteur(s): Brigitte Piniewski
- Narrateur(s): Claudia Dunn
- Durée: 6 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Crypto, decentralized blockchains, NFTs, and the ownership economy of web3 hold the future of healthcare. Discover how the metaverse provides innovative business models that are poised to revolutionize the way society approaches health. Wealthcare envisions what healthcare and wellness may look like when accidental wellness is a thing of the past. As web3 technology reshapes finance, supply chain, social media, and other industries, Wealthcare presents a clear case for including healthcare privacy and innovation within this new reality.
-
Wealthcare
- Demystifying Web3 and the Rise of Personal Data Economies
- Narrateur(s): Claudia Dunn
- Durée: 6 h et 7 min
- Date de publication: 2023-08-21
- Langue: Anglais
-
Today’s healthcare system routinely sells your private details for remarkable sums of money. It is grounded in our current inherently flawed web2 world of corporately owned services. In a web3 world, your privacy and health data are yours alone. Wealthcare is your window into that tomorrow....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,19 $
-
-
-
Hacke-moi si tu peux
- Mémoires d’un cyberpirate repenti
- Auteur(s): Florent Curtet, Sophie Garcin
- Narrateur(s): Cédric Dumond
- Durée: 4 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Mémoires d'un cyberpirate repenti. Enfant génial et hyperactif, Florent voit dans l'ordinateur le complice d'une vie. Cette machine qui grandira en même temps que lui sera sa force autant que son démon. Très vite, il se choisit un pseudo et devient tout naturellement l'un des hackers français les plus infatigables du XXIe siècle.
-
Hacke-moi si tu peux
- Mémoires d’un cyberpirate repenti
- Narrateur(s): Cédric Dumond
- Durée: 4 h et 36 min
- Date de publication: 2023-08-03
- Langue: Français
-
Mémoires d'un cyberpirate repenti. Enfant génial et hyperactif, Florent voit dans l'ordinateur le complice d'une vie. Cette machine qui grandira en même temps que...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 16,68 $
-
-
-
The Cyber Security Handbook
- Prepare for, Respond to and Recover from Cyber Attacks with the It Governance Cyber Resilience Framework (CRF)
- Auteur(s): Alan Calder
- Narrateur(s): Stephen Perring
- Durée: 7 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
-
The Cyber Security Handbook
- Prepare for, Respond to and Recover from Cyber Attacks with the It Governance Cyber Resilience Framework (CRF)
- Narrateur(s): Stephen Perring
- Durée: 7 h et 59 min
- Date de publication: 2021-11-05
- Langue: Anglais
-
This audiobook is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF)....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $
-
-
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Auteur(s): Ed Adams
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Date de publication: 2024-03-26
- Langue: Anglais
-
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization can contribute to improving its cybersecurity backbone.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92 $
-
-
-
Secret Key Cryptography
- Ciphers, from Simple to Unbreakable
- Auteur(s): Frank Rubin
- Narrateur(s): Christopher Kendrick
- Durée: 16 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Secret Key Cryptography gives you a toolbox of cryptographic techniques and secret key methods. The audiobook’s simple, non-technical language is easy to understand and is accessible for any listener even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches including a never-before-seen way to implement the uncrackable one-time pad algorithm. Whoever you are, this audiobook is for you!
-
Secret Key Cryptography
- Ciphers, from Simple to Unbreakable
- Narrateur(s): Christopher Kendrick
- Durée: 16 h et 49 min
- Date de publication: 2023-01-26
- Langue: Anglais
-
Explore the fascinating and rich world of Secret Key Cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes including 30 unbreakable methods.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26 $
-
-
-
Cybersecurity as a Fishing Game
- Developing Cybersecurity in the Form of Fishing Game and What Top Management Should Understand
- Auteur(s): Dr. Tan Kian Hua, Dr. Vladimir Biruk
- Narrateur(s): Craig Long
- Durée: 2 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Reflecting the evolution of information and communication tools and technologies via synergizing theoretical and practical skills in our audiobook, Cybersecurity as a Fishing Game, we aimed to convey, in a concise manner, the importance of cyber safety in regards to cybersecurity and the value of correct use.
-
Cybersecurity as a Fishing Game
- Developing Cybersecurity in the Form of Fishing Game and What Top Management Should Understand
- Narrateur(s): Craig Long
- Durée: 2 h et 3 min
- Date de publication: 2021-12-08
- Langue: Anglais
-
Reflecting the evolution of information and communication tools and technologies via synergizing theoretical and practical skills, Cybersecurity as a Fishing Game, conveys, concisely, the importance of cyber safety in regards to cybersecurity and the value of correct use....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2023-06-12
- Langue: Anglais
-
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity experts agree: No one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls.
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2022-01-14
- Langue: Anglais
-
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
NIST CSF 2.0
- Your Essential Introduction to Managing Cybersecurity Risks
- Auteur(s): Andrew Pattison
- Narrateur(s): Kerry Hutchinson
- Durée: 2 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organize their critical activities and ensure they remain up to date, Version 2.0 states that “The CSF is designed to be used by organizations of all sizes and sectors, including industry, government, academia, and nonprofit organizations, regardless of the maturity level of their cybersecurity programs.”
-
NIST CSF 2.0
- Your Essential Introduction to Managing Cybersecurity Risks
- Narrateur(s): Kerry Hutchinson
- Durée: 2 h et 7 min
- Date de publication: 2025-05-30
- Langue: Anglais
-
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
CompTIA CySA+ Certification
- The Ultimate Study Guide to Practice Questions With Answers and Master the Cybersecurity Analyst Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Unlock the doors to a world of cybersecurity mastery with "Mastering CySA+: A Comprehensive Guide to CompTIA CySA+ Certification." This meticulously crafted guide is your key to conquering the challenges of the CompTIA Cybersecurity Analyst (CySA+) certification, offering a comprehensive blend of practice questions, detailed answers, and a roadmap to confidently pass the exam.
-
CompTIA CySA+ Certification
- The Ultimate Study Guide to Practice Questions With Answers and Master the Cybersecurity Analyst Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 1 min
- Date de publication: 2024-01-16
- Langue: Anglais
-
Unlock the doors to a world of cybersecurity mastery with "Mastering CySA+: A Comprehensive Guide to CompTIA CySA+ Certification." This meticulously crafted guide is your key to conquering the challenges of the CompTIA Cybersecurity Analyst (CySA+) certification....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $
-
-
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- Auteur(s): Frank W. Abagnale
- Narrateur(s): Raymond Todd
- Durée: 7 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- Narrateur(s): Raymond Todd
- Durée: 7 h et 16 min
- Date de publication: 2007-04-09
- Langue: Anglais
- Someone in the U.S. is an identity-theft victim every four seconds. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,98 $
-
-
-
Attack Surface Management
- Strategies and Techniques for Safeguarding Your Digital Assets
- Auteur(s): MJ Kaufmann, Ron Eddings
- Narrateur(s): Dean Gallagher
- Durée: 10 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Authors Ron Eddings and MJ Kaufmann offer actionable solutions for newcomers and experts alike, using machine learning and AI techniques. ASM helps you routinely assess digital assets to gain complete insight into vulnerabilities, and potential threats.
-
Attack Surface Management
- Strategies and Techniques for Safeguarding Your Digital Assets
- Narrateur(s): Dean Gallagher
- Durée: 10 h
- Date de publication: 2025-07-29
- Langue: Anglais
-
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,53 $
-
-
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Auteur(s): Roger A. Grimes
- Narrateur(s): Mike Lenz
- Durée: 11 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Taming the Hacking Storm is a groundbreaking new roadmap to solving the Internet security issues currently plaguing countries, businesses, and individuals around the world. In easy-to-understand and non-technical language, cybersecurity veteran Roger Grimes describes the most prevalent threats to our online safety today and what ties them all together. He goes on to lay out a comprehensive and robust framework for combating that threat, one that rests on a foundation of identity verification, and explains exactly how to implement it in the real world.
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Narrateur(s): Mike Lenz
- Durée: 11 h
- Date de publication: 2025-07-01
- Langue: Anglais
-
Taming the Hacking Storm is a groundbreaking new roadmap to solving the Internet security issues currently plaguing countries, businesses, and individuals around the world.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92 $
-
-
-
AI for Defense and Intelligence
- Auteur(s): Patrick Biltgen
- Narrateur(s): Patrick Biltgen
- Durée: 10 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
AI for Defense and Intelligence is a timely and compelling listen for graduate students interested in this rapidly-growing field, mid-career professionals looking to rebrand, and senior leaders in federal agencies who want to get smart on the latest tech. This approachable and focused book provides an overview of AI basics, a review of powerful machine learning models, and a discussion of applications across natural language processing (NLP), computer vision (CV), optimization, agent-based modeling and more.
-
AI for Defense and Intelligence
- Narrateur(s): Patrick Biltgen
- Durée: 10 h et 12 min
- Date de publication: 2024-07-19
- Langue: Anglais
-
AI for Defense and Intelligence is a timely and compelling listen for graduate students interested in this rapidly-growing field, mid-career professionals looking to rebrand, and senior leaders in federal agencies who want to get smart on the latest tech.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,27 $
-
-
-
Reclaim Your Digital Gold
- How Your Personal Data Is Changing Business
- Auteur(s): Wayne Hinds
- Narrateur(s): Curt Caster
- Durée: 4 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
By understanding the profound power of personal data, listeners can take control of their digital lives, safeguard their privacy, and navigate the digital landscape with confidence. Empower yourself with knowledge. Get your copy of the book today to discover the transformative power of personal data and take control of your digital life.
-
-
Informative
- Écrit par Thomas Donovan le 2025-02-16
-
Reclaim Your Digital Gold
- How Your Personal Data Is Changing Business
- Narrateur(s): Curt Caster
- Durée: 4 h et 35 min
- Date de publication: 2025-02-13
- Langue: Anglais
-
By understanding the profound power of personal data, listeners can take control of their digital lives, safeguard their privacy, and navigate the digital landscape with confidence. Empower yourself with knowledge.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- Auteur(s): Josephine Wolff
- Narrateur(s): Kate Reading
- Durée: 14 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity incidents make the news with startling regularity. Each breach makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- Narrateur(s): Kate Reading
- Durée: 14 h
- Date de publication: 2018-11-13
- Langue: Anglais
-
Cybersecurity incidents make the news with startling regularity. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,13 $
-
-
-
Ransomware Protection Playbook
- Auteur(s): Roger A. Grimes
- Narrateur(s): Danny Campbell
- Durée: 10 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.
-
Ransomware Protection Playbook
- Narrateur(s): Danny Campbell
- Durée: 10 h et 28 min
- Date de publication: 2021-12-31
- Langue: Anglais
-
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83 $
-