Computer Security
-
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Auteur(s): Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What to Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour—from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria—recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes.
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Date de publication: 2023-11-21
- Langue: Anglais
-
A team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
Customer Data and Privacy
- The Insights You Need from Harvard Business Review
- Auteur(s): Harvard Business Review
- Narrateur(s): Christopher Grove, Janet Metzger
- Durée: 2 h et 56 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Customer Data and Privacy: The Insights You Need from Harvard Business Review will help you understand the tangled interdependencies and complexities and develop strategies that allow your company to be good stewards, collecting, using, and storing customer data responsibly.
-
Customer Data and Privacy
- The Insights You Need from Harvard Business Review
- Narrateur(s): Christopher Grove, Janet Metzger
- Série: HBR Insights Series
- Durée: 2 h et 56 min
- Date de publication: 2020-09-22
- Langue: Anglais
-
Customer Data and Privacy: The Insights You Need from Harvard Business Review will help you understand the tangled interdependencies and complexities and develop strategies that allow your company to be good stewards, collecting, using, and storing customer data responsibly....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
12,24 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Auteur(s): Lester Evans
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? You’re not alone. Half-baked products and services that chip away at your sense of ownership, independence and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers.
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Date de publication: 2019-02-05
- Langue: Anglais
-
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- Auteur(s): Perry Carpenter, Kevin Mitnick - foreword
- Narrateur(s): Stephen Bel Davies
- Durée: 12 h et 20 min
- Version intégrale
-
Au global4
-
Performance4
-
Histoire4
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good book but....
- Écrit par Anonymous le 2025-07-04
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- Narrateur(s): Stephen Bel Davies
- Durée: 12 h et 20 min
- Date de publication: 2020-07-21
- Langue: Anglais
-
Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness training programs that drive secure behaviors and culture change....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Fundamentals of Digital Forensics
- Uncovering the Digital Truth
- Auteur(s): Eric Waldrep
- Narrateur(s): David Karnes
- Durée: 2 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In an age where almost everything we do leaves a digital footprint, the field of digital forensics has never been more important. From tracking down cybercriminals to recovering critical data, digital forensics is at the forefront of solving modern-day crimes and protecting sensitive information.
-
The Fundamentals of Digital Forensics
- Uncovering the Digital Truth
- Narrateur(s): David Karnes
- Durée: 2 h et 4 min
- Date de publication: 2024-12-12
- Langue: Anglais
-
In an age where almost everything we do leaves a digital footprint, the field of digital forensics has never been more important. From tracking down cybercriminals to recovering critical data, digital forensics is at the forefront of solving modern-day crimes and protecting sensitive information.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Auteur(s): L.D. Knowings
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
You're not a tech wizard, and you don't need to be. This book speaks directly to you the concerned netizen, the proactive parent, the small business owner, or the budding entrepreneur. It's designed to break down the complexities of cybersecurity into something you can understand and apply.
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Date de publication: 2024-06-05
- Langue: Anglais
-
Worried about hackers? Fight back with confidence! Discover straightforward steps to safeguard your online presence perfect for non-techies and pros alike.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
To Catch a Predator
- Protecting Your Kids from Online Enemies Already in Your Home
- Auteur(s): Chris Hansen
- Narrateur(s): Todd McLaren
- Durée: 8 h et 28 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In his book To Catch a Predator, Chris Hansen, the on-air correspondent for one of Dateline's most successful series, looks deeper into the world of child predators. The book expands beyond the Dateline series to include more commentary from psychological and criminal experts about the origins and methods of child predators, and includes substantive advice for both parents and children on how to protect kids who use the Internet.
-
To Catch a Predator
- Protecting Your Kids from Online Enemies Already in Your Home
- Narrateur(s): Todd McLaren
- Durée: 8 h et 28 min
- Date de publication: 2007-05-23
- Langue: Anglais
- In his book To Catch a Predator, Chris Hansen, the on-air correspondent for one of Dateline's most successful series, looks deeper into the world of child predators....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Auteur(s): Heidi Boghosian
- Narrateur(s): Charles Hubble
- Durée: 7 h et 27 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities. No one is exempt from data mining: by owning a smartphone, or using social media or a credit card, we...
-
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Narrateur(s): Charles Hubble
- Série: Myths Made in America
- Durée: 7 h et 27 min
- Date de publication: 2021-07-13
- Langue: Anglais
- An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities. No one is exempt from data mining: by owning a smartphone, or using social media or a credit card, we...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Auteur(s): Jack Jones
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want, do what you want, and buy whatever you want. But there is so much more to the deep web than the Hollywood picture of a lawless frontier land. Sure, there are illicit elements to it. It can be a dangerous place if you don't know what you are doing. But, with all that, it should be remembered what the deep web is all about - it's about freedom of speech in a world of censorship and political correctness.
-
-
Provides some practical information
- Écrit par Mary-Anne le 2018-12-15
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Date de publication: 2017-07-14
- Langue: Anglais
- It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want and buy whatever you want....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Risk Management
- Mastering the Fundamentals Using the NIST Cybersecurity Framework
- Auteur(s): Cynthia Brumfield, Brian Haugli - contributor
- Narrateur(s): Ulf Bjorklund
- Durée: 5 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers an up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers listeners overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks.
-
Cybersecurity Risk Management
- Mastering the Fundamentals Using the NIST Cybersecurity Framework
- Narrateur(s): Ulf Bjorklund
- Durée: 5 h et 55 min
- Date de publication: 2025-09-16
- Langue: Anglais
-
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers an exploration of the fundamentals of cybersecurity risk planning and management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,47 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- Auteur(s): Chris Moschovitis
- Narrateur(s): Sean Pratt
- Durée: 9 h et 9 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Really excellent guide very well read
- Écrit par Joel C LaRusic le 2019-08-29
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- Narrateur(s): Sean Pratt
- Durée: 9 h et 9 min
- Date de publication: 2018-06-26
- Langue: Anglais
-
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
If It's Smart, It's Vulnerable
- Auteur(s): Mikko Hypponen
- Narrateur(s): Rich Miller
- Durée: 7 h et 32 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
All our devices and gadgets—from our refrigerators to our home security systems—are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing.
-
If It's Smart, It's Vulnerable
- Narrateur(s): Rich Miller
- Durée: 7 h et 32 min
- Date de publication: 2022-09-27
- Langue: Anglais
-
Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Auteur(s): Perry Carpenter, Kai Roer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
Really good book, but lots of diagrams
- Écrit par Vince le 2022-12-16
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven insights into how to transform your organization's security culture and reduce human risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- Auteur(s): Anthony Hack
- Narrateur(s): Robert Plank
- Durée: 3 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking. You don't hear about the ethical hacking in the news, but there are people out there with the same job description fighting the malicious hackers daily, and they get the bad rep.
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- Narrateur(s): Robert Plank
- Durée: 3 h et 29 min
- Date de publication: 2020-03-25
- Langue: Anglais
-
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Auteur(s): Aram Sinnreich, Jesse Gilbert
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Date de publication: 2024-04-30
- Langue: Anglais
-
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Der große Cyberangriff
- Bist du vorbereitet?
- Auteur(s): R. Richter
- Narrateur(s): Pierre Huber
- Durée: 4 h et 14 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In diesem Buch wird gezeigt, wie du dich gegen die Gefahren eines Cyberangriffs wappnest. Mit klaren Analysen, praktischen Tipps – von Cyberhygiene über Notfallvorräte bis hin zu psychologischer Resilienz – und einer sofort anwendbaren Notfall-Schnellberatung wirst du für die Herausforderung einer digitalen Krise gerüstet!
-
Der große Cyberangriff
- Bist du vorbereitet?
- Narrateur(s): Pierre Huber
- Durée: 4 h et 14 min
- Date de publication: 2025-11-24
- Langue: Allemand
-
In diesem Buch wird gezeigt, wie du dich gegen die Gefahren eines Cyberangriffs wappnest. Mit klaren Analysen, praktischen Tipps und einer sofort anwendbaren Notfall-Schnellberatung wirst du für die Herausforderung einer digitalen Krise gerüstet!
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
iPhone 15 for Seniors Made Easy
- Step-by-Step, Hassle-Free Guide to Safety, Security, Improved Technical Skills and FUN
- Auteur(s): Kenneth Overtech
- Narrateur(s): Melissa Costea
- Durée: 5 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Have you ever felt left behind by the rapid changes in technology? Tired of relying on others to solve your device dilemmas? Whether for yourself or a loved one, mastering the iPhone 15 is easier than you think! This simple guide is tailored specifically for seniors, offering clear, easy-to-follow instructions with a touch of humor.
-
iPhone 15 for Seniors Made Easy
- Step-by-Step, Hassle-Free Guide to Safety, Security, Improved Technical Skills and FUN
- Narrateur(s): Melissa Costea
- Durée: 5 h
- Date de publication: 2024-11-20
- Langue: Anglais
-
Have you ever felt left behind by the rapid changes in technology? Tired of relying on others to solve your device dilemmas? Whether for yourself or a loved one, mastering the iPhone 15 is easier than you think!
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Dark Web and Scams
- A Guide for Personal Cybersecurity
- Auteur(s): Ivette Smith
- Narrateur(s): Mike Martinez
- Durée: 4 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Dark Web and Scams by Ivette Ibarra Smith is an in-depth guide to understanding the dark web and various cyber scams, aiming to improve personal cybersecurity. The book covers several topics, starting with an exploration of the dark web—demystifying its role as both a space for illegal activities and a haven for privacy-focused individuals such as journalists and whistleblowers.
-
The Dark Web and Scams
- A Guide for Personal Cybersecurity
- Narrateur(s): Mike Martinez
- Durée: 4 h et 5 min
- Date de publication: 2025-03-10
- Langue: Anglais
-
The Dark Web and Scams by Ivette Ibarra Smith is an in-depth guide to understanding the dark web and various cyber scams, aiming to improve personal cybersecurity.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Liquid Computing
- The Future of Human-Tech Symbiosis
- Auteur(s): Paramendra Bhagat
- Narrateur(s): Ed Fairbanks's voice replica
- Durée: 3 h et 19 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Liquid Computing envisions a future beyond apps and interfaces—a world where artificial intelligence is ambient, adaptive, and seamlessly embedded in daily life. In this era, we don’t “use” computers; we live inside intelligent flows that span devices, contexts, and interactions. The book traces the evolution from hardware to cloud to AI as a responsive, invisible operating medium—always learning, assisting, and co-creating with us. It introduces the Liquid Interface, where interaction is natural, multimodal, and emotionally aware. Instead of commands, we converse.
-
Liquid Computing
- The Future of Human-Tech Symbiosis
- Narrateur(s): Ed Fairbanks's voice replica
- Durée: 3 h et 19 min
- Date de publication: 2025-06-27
- Langue: Anglais
-
Liquid Computing envisions a future beyond apps and interfaces—a world where artificial intelligence is ambient, adaptive, and seamlessly embedded in daily life. In this era, we don’t “use” computers; we live inside intelligent flows that span devices, contexts, and interactions.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-