Computer Security
-
-
Human-Centered Security
- How to Design Systems That Are Both Safe and Usable
- Auteur(s): Heidi Trost, Adam Shostack - foreword
- Narrateur(s): Simran Singh
- Durée: 3 h et 45 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching consequences. Threats to digital infrastructure often impact critical physical systems, potentially causing real-world harm. With AI agents set to handle extensive personal information, data security and privacy are more crucial than ever.
-
Human-Centered Security
- How to Design Systems That Are Both Safe and Usable
- Narrateur(s): Simran Singh
- Durée: 3 h et 45 min
- Date de publication: 2026-03-03
- Langue: Anglais
-
In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching consequences.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
11,39 $ ou gratuit avec l'essai de 30 jours
-
-
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global30
-
Performance25
-
Histoire25
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Okay
- Écrit par AmazonShopper le 2024-03-04
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Date de publication: 2019-02-28
- Langue: Anglais
-
Renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Networking
- The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
- Auteur(s): Michael B. White
- Narrateur(s): Jim D. Johnston
- Durée: 10 h et 6 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
Technology has gradually transitioned from wired to wireless over the years with tons of benefits. From the internet of things to wireless communication, we are all witnesses of the huge benefits of wireless technologies. This audiobook covers various subjects and highlights both the benefits and challenges of wireless technologies.
-
-
Lisp
- Écrit par Kevin le 2024-06-01
-
Computer Networking
- The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
- Narrateur(s): Jim D. Johnston
- Durée: 10 h et 6 min
- Date de publication: 2019-02-18
- Langue: Anglais
-
Technology has gradually transitioned from wired to wireless over the years with tons of benefits. This audiobook covers various subjects and highlights both the benefits and challenges of wireless technologies....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: Computer Hacking, Security Testing, Penetration Testing, and Basic Security
- Auteur(s): Gary Hall, Erin Watson
- Narrateur(s): T. W. Ashworth
- Durée: 3 h et 4 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
Are you interested in learning about how to hack systems? Do you want to learn how to protect yourself from being hacked? Do you wish to learn the art of ethical hacking? Do you want to know the secret techniques that genius hackers use? Hacking is one of the most misunderstood cyber concepts. The majority of people think of hacking as something evil or illegal, but nothing could be farther from the truth. Indeed, hacking can be a real threat, but if you want to stop someone from hacking you, you must also learn how to hack!
-
Hacking: Computer Hacking, Security Testing, Penetration Testing, and Basic Security
- Narrateur(s): T. W. Ashworth
- Durée: 3 h et 4 min
- Date de publication: 2017-03-09
- Langue: Anglais
- Are you interested in learning about how to hack systems? Do you want to learn how to protect yourself from being hacked? Do you wish to learn the art of ethical hacking? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
National Security
- A Jericho Quinn Thriller, Book 1
- Auteur(s): Marc Cameron
- Narrateur(s): Tom Weiner
- Durée: 8 h et 56 min
- Version intégrale
-
Au global22
-
Performance21
-
Histoire21
Warning: The next terrorist attack on American soil is coming...sooner than you think. They can strike anytime, anywhere. A public landmark. A suburban shopping mall. And now, the human body itself. Three Middle Eastern terrorists have been injected with a biological weapon, human time bombs unleashed on American soil. They are prepared to die. To spread their disease. To annihilate millions. If America hopes to fight this enemy from within, we need a new kind of weapon. Meet Special Agent Jericho Quinn. Air Force veteran. Champion boxer. Trained assassin.
-
National Security
- A Jericho Quinn Thriller, Book 1
- Narrateur(s): Tom Weiner
- Série: Jericho Quinn, Livre 1
- Durée: 8 h et 56 min
- Date de publication: 2020-08-04
- Langue: Anglais
-
Warning: The next terrorist attack on American soil is coming...sooner than you think. They can strike anytime, anywhere. A public landmark. A suburban shopping mall. And now, the human body itself. Three Middle Eastern terrorists have been injected with a biological weapon....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Art of Attack
- Attacker Mindset for Security Professionals
- Auteur(s): Maxie Reynolds
- Narrateur(s): Stephanie Dillard
- Durée: 9 h et 50 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
The Art of Attack
- Attacker Mindset for Security Professionals
- Narrateur(s): Stephanie Dillard
- Durée: 9 h et 50 min
- Date de publication: 2021-11-16
- Langue: Anglais
-
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- Auteur(s): Mike Chapple, David Seidl
- Narrateur(s): Ray Greenley
- Durée: 17 h et 20 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You'll find clear and concise information on critical security topics presented by way of practical, real-world examples, chapter reviews, and exam highlights.
-
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- Narrateur(s): Ray Greenley
- Durée: 17 h et 20 min
- Date de publication: 2024-01-16
- Langue: Anglais
-
In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
33,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Auteur(s): Cliff Stoll
- Narrateur(s): Will Damron
- Durée: 12 h et 46 min
- Version intégrale
-
Au global45
-
Performance39
-
Histoire39
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
so intriguing
- Écrit par Jesse le 2026-01-12
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Narrateur(s): Will Damron
- Durée: 12 h et 46 min
- Date de publication: 2020-01-31
- Langue: Anglais
-
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- Auteur(s): Taimur Ijlal
- Narrateur(s): Sean Oblak
- Durée: 1 h et 40 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced. However, this topic can be quite challenging for newcomers who want to understand the governance and cyber-security risks that AI introduces. This book assumes zero prior knowledge of AI or machine learning and explains in an easy-to-understand way how to govern and secure AI.
-
-
Love this!!
- Écrit par Cleopatra le 2025-06-25
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- Narrateur(s): Sean Oblak
- Durée: 1 h et 40 min
- Date de publication: 2022-07-15
- Langue: Anglais
-
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Mastering Bitcoin
- Programming the Open Blockchain
- Auteur(s): Andreas M. Antonopoulos
- Narrateur(s): Rick Font
- Durée: 5 h et 22 min
- Version abrégée
-
Au global5
-
Performance5
-
Histoire5
Join the technological revolution that's taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the knowledge you need to participate in the internet of money. Whether you're building the next killer app, investing in a start-up, or simply curious about the technology, this revised and expanded second edition provides essential detail to get you started.
-
-
Great. But narrator should be a technical person.
- Écrit par Amazon Customer le 2021-12-19
-
Mastering Bitcoin
- Programming the Open Blockchain
- Narrateur(s): Rick Font
- Durée: 5 h et 22 min
- Date de publication: 2021-10-11
- Langue: Anglais
-
Join the technological revolution that's taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the knowledge you need to participate in the internet of money....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,19 $ ou gratuit avec l'essai de 30 jours
-
-
-
Defend Your Data: Cybersecurity Essentials for Everyone
- Practical Steps to Protect Your Digital Life and Safeguard Your Data
- Auteur(s): Ousmane Barry
- Narrateur(s): Snake Porter
- Durée: 3 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Defend Your Data is a practical guide for anyone who wants to feel more confident and secure in the digital world. It walks you through the threats most people face today, why they work, and how to defend yourself with simple habits that make a real difference. You’ll learn how phishing, malware, ransomware, and social-engineering attacks actually unfold, and what steps you can take to protect your devices, accounts, home network, and personal information. The book breaks down complex ideas in a way that feels approachable, even if you don’t work in technology.
-
Defend Your Data: Cybersecurity Essentials for Everyone
- Practical Steps to Protect Your Digital Life and Safeguard Your Data
- Narrateur(s): Snake Porter
- Durée: 3 h et 59 min
- Date de publication: 2026-01-05
- Langue: Anglais
-
Defend Your Data is a practical guide for anyone who wants to feel more confident and secure in the digital world. It walks you through the threats most people face today, why they work, and how to defend yourself with simple habits that make a real difference.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- Auteur(s): Eric Conrad, Seth Misenar, Joshua Feldman
- Narrateur(s): Matthew E. Kelly
- Durée: 10 h et 4 min
- Version intégrale
-
Au global4
-
Performance3
-
Histoire2
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- Narrateur(s): Matthew E. Kelly
- Durée: 10 h et 4 min
- Date de publication: 2021-01-11
- Langue: Anglais
-
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacker Culture A to Z
- A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World
- Auteur(s): Kim Crawley
- Narrateur(s): Jen Jayden
- Durée: 11 h et 18 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.
-
Hacker Culture A to Z
- A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World
- Narrateur(s): Jen Jayden
- Durée: 11 h et 18 min
- Date de publication: 2024-01-09
- Langue: Anglais
-
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
CompTIA Security+ Exam Study Guide 2025-2026
- Your Complete Crash Course with 1,000+ Practice Questions, Online Platform Access, and Full-Length Exams
- Auteur(s): William James
- Narrateur(s): Alex Lindstrom
- Durée: 7 h et 32 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Master the CompTIA Network+ exam with confidence using this practical certification guide that turns complex networking into simple, actionable lessons. CompTIA Network+ Exam helps you not only pass the exam but also gain the real skills IT pros need. Whether you are new to networking, an IT student, or preparing for recertification, this guide delivers everything required. Structured around the latest CompTIA Network+ (N10-009) objectives, it breaks down networking fundamentals, operations, security, and troubleshooting with plain-English explanations, visuals, and real-world scenarios.
-
CompTIA Security+ Exam Study Guide 2025-2026
- Your Complete Crash Course with 1,000+ Practice Questions, Online Platform Access, and Full-Length Exams
- Narrateur(s): Alex Lindstrom
- Durée: 7 h et 32 min
- Date de publication: 2025-12-19
- Langue: Anglais
-
CompTIA Network+ Exam: A Certification Guide with Step-by-Step Lessons, Practice Questions, and Real-World Examples helps you not only pass the exam but also gain the real skills IT pros need.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Beginners
- Auteur(s): Raef Meeuwisse
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
Cybersecurity for Beginners
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Date de publication: 2017-09-21
- Langue: Anglais
- This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- Auteur(s): Douglas W. Hubbard, Richard Seiersen
- Narrateur(s): Jim Seybert
- Durée: 14 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- Narrateur(s): Jim Seybert
- Durée: 14 h et 5 min
- Date de publication: 2023-04-25
- Langue: Anglais
-
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Breaking and Entering
- The Extraordinary Story of a Hacker Called "Alien"
- Auteur(s): Jeremy N. Smith
- Narrateur(s): Jonathan Todd Ross
- Durée: 12 h et 4 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
When she arrived at MIT in the 1990s, Alien wanted to study aerospace engineering, but she was soon drawn to the school’s venerable tradition of high-risk physical trespassing: the original “hacking”. Within a year, one of her hallmates was dead, two others were on trial, and two had been institutionalized. Alien’s adventures were only just beginning.
-
Breaking and Entering
- The Extraordinary Story of a Hacker Called "Alien"
- Narrateur(s): Jonathan Todd Ross
- Durée: 12 h et 4 min
- Date de publication: 2019-01-08
- Langue: Anglais
-
This taut, true thriller takes a deep dive into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
28,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Certificate of Cloud Security Knowledge (CCSK v5) Study Guide
- In-Depth Guidance and Practice
- Auteur(s): Graham Thompson
- Narrateur(s): David Stifel
- Durée: 12 h et 56 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As cloud technology becomes increasingly essential across industries, the need for thorough security knowledge and certification has never been more crucial. The Certificate of Cloud Security Knowledge (CCSK) exam, globally recognized and highly respected, presents a formidable challenge for many. Author Graham Thompson offers you in-depth guidance and practical tools not only to pass the exam but also to grasp the broader implications of cloud security.
-
Certificate of Cloud Security Knowledge (CCSK v5) Study Guide
- In-Depth Guidance and Practice
- Narrateur(s): David Stifel
- Durée: 12 h et 56 min
- Date de publication: 2025-12-02
- Langue: Anglais
-
As cloud technology becomes increasingly essential across industries, the need for thorough security knowledge and certification has never been more crucial. The Certificate of Cloud Security Knowledge (CCSK) exam, globally recognized and highly respected, presents a formidable challenge for many.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Auteur(s): George Finney, John Kindervag - foreword
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Date de publication: 2022-10-04
- Langue: Anglais
-
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Surveillance Valley
- The Secret Military History of the Internet
- Auteur(s): Yasha Levine
- Narrateur(s): LJ Ganser
- Durée: 10 h et 42 min
- Version intégrale
-
Au global18
-
Performance16
-
Histoire16
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
A History Lesson Everyone Should Know
- Écrit par JJHicks le 2024-04-15
-
Surveillance Valley
- The Secret Military History of the Internet
- Narrateur(s): LJ Ganser
- Durée: 10 h et 42 min
- Date de publication: 2018-03-20
- Langue: Anglais
- In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-