Computer Security
-
-
Investigating Cryptocurrencies
- Understanding, Extracting, and Analyzing Blockchain Evidence
- Auteur(s): Nick Furneaux
- Narrateur(s): Christopher Grove
- Durée: 10 h et 22 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. Listen to this book to understand blockchain and transaction technologies, set up and run cryptocurrency accounts, identify users of cryptocurrencies, and more.
-
Investigating Cryptocurrencies
- Understanding, Extracting, and Analyzing Blockchain Evidence
- Narrateur(s): Christopher Grove
- Durée: 10 h et 22 min
- Date de publication: 2019-12-03
- Langue: Anglais
-
Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- Auteur(s): Matthew K. Sharp, Kyriakos Lambros
- Narrateur(s): Christopher Grove
- Durée: 13 h et 7 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Informative Resource with Lackluster Storytelling
- Écrit par Alex le 2023-07-12
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- Narrateur(s): Christopher Grove
- Durée: 13 h et 7 min
- Date de publication: 2022-03-01
- Langue: Anglais
-
Learn to effectively deliver business aligned cybersecurity outcomes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Because You Can: Your Cybersecurity Career
- A Simple and Practical Handbook with Actionable Insights for Success
- Auteur(s): Ali Khan, Gaurav Kumar, Arlene Worsley
- Narrateur(s): Skye Alley
- Durée: 9 h et 42 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most sought-after professionals. Cybersecurity is one of the hottest jobs on the market today, with comparatively high wages and unparalleled growth opportunities. With the organic move to the cloud, digital-first initiatives, and the socioeconomic pressures from the pandemic, the cybersecurity talent demand is unprecedented.
-
Because You Can: Your Cybersecurity Career
- A Simple and Practical Handbook with Actionable Insights for Success
- Narrateur(s): Skye Alley
- Durée: 9 h et 42 min
- Date de publication: 2022-04-20
- Langue: Anglais
-
As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most sought-after professionals. Cybersecurity is one of the hottest jobs on the market today, with comparatively high wages and unparalleled growth opportunities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Asking the Right Questions
- A Guide to Critical OT Cybersecurity
- Auteur(s): Chukwudi Abalogu
- Narrateur(s): B Fike
- Durée: 4 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The journey towards robust OT cybersecurity is not a destination but a continuous evolution. As technology advances and threat actors become more sophisticated, the need for vigilance and adaptation remains paramount. This book has provided a framework—a set of guiding principles and actionable strategies—for building a resilient cybersecurity posture. However, the true measure of success lies not in the implementation of specific technologies or policies but in the cultivation of a security-conscious culture.
-
Asking the Right Questions
- A Guide to Critical OT Cybersecurity
- Narrateur(s): B Fike
- Durée: 4 h et 4 min
- Date de publication: 2025-03-20
- Langue: Anglais
-
The journey towards robust OT cybersecurity is not a destination but a continuous evolution. As technology advances and threat actors become more sophisticated, the need for vigilance and adaptation remains paramount.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Swiped
- How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
- Auteur(s): Adam Levin
- Narrateur(s): Adam Levin
- Durée: 7 h et 23 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Adam Levin, a longtime consumer advocate and identity fraud expert, is your guide to this brave new world. By telling memorable stories and extracting the relevant lessons, he offers a strategy for dealing with these risks. You may not be able to prevent identity theft, but you certainly shouldn't wait until it happens to take action. Levin's approach is defined by the three M's: minimizing risk, monitoring your identity, and managing the damage.
-
Swiped
- How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
- Narrateur(s): Adam Levin
- Durée: 7 h et 23 min
- Date de publication: 2015-11-16
- Langue: Anglais
- Swiped is a practical, lively audiobook that is essential to surviving the ever-changing world of online security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
38,96 $ ou gratuit avec l'essai de 30 jours
-
-
-
Docker in Action
- Auteur(s): Jeff Nickoloff
- Narrateur(s): Aiden Humphreys
- Durée: 10 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Docker in Action teaches listeners how to create, deploy, and manage applications hosted in Docker containers. After starting with a clear explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications. You will also learn how to run programs securely and how to manage shared resources. Using carefully designed examples, the book teaches you how to orchestrate containers and applications from installation to removal.
-
Docker in Action
- Narrateur(s): Aiden Humphreys
- Durée: 10 h et 12 min
- Date de publication: 2018-11-08
- Langue: Anglais
-
Docker in Action teaches listeners how to create, deploy, and manage applications hosted in Docker containers. After an explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity and Privacy Law Introduction
- Auteur(s): Convocourses
- Narrateur(s): Kim Pepper
- Durée: 3 h et 13 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice.
-
Cybersecurity and Privacy Law Introduction
- Narrateur(s): Kim Pepper
- Durée: 3 h et 13 min
- Date de publication: 2024-02-22
- Langue: Anglais
-
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Man Overboard
- An Ali Reynolds Novel
- Auteur(s): J.A. Jance
- Narrateur(s): Karen Ziemba
- Durée: 10 h et 36 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Ali Reynolds returns in this suspenseful thriller featuring New York Times bestselling author J.A. Jance’s signature “fast pacing, surprising plot twists, and a strong, principled heroine” (Booklist). Cybersecurity expert Roger McGeary finally has his life back on track after years of...
-
Man Overboard
- An Ali Reynolds Novel
- Narrateur(s): Karen Ziemba
- Série: Ali Reynolds, Livre 12
- Durée: 10 h et 36 min
- Date de publication: 2017-03-21
- Langue: Anglais
- Ali Reynolds returns in this suspenseful thriller featuring New York Times bestselling author J.A. Jance’s signature “fast pacing, surprising plot twists, and a strong, principled heroine” (Booklist). Cybersecurity expert Roger McGeary finally has his life back on track after years of...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,99 $ ou gratuit avec l'essai de 30 jours
-
-
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Auteur(s): L.D. Knowings
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing. Authored by seasoned cybersecurity experts, this comprehensive book provides an immersive journey through the critical principles, methodologies, and practical applications needed to navigate the CompTIA Pentest+ Certification.
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 8 min
- Date de publication: 2023-12-07
- Langue: Anglais
-
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- Auteur(s): Thomas J. Parenty, Jack J. Domet
- Narrateur(s): Jonathan Todd Ross
- Durée: 5 h et 47 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- Narrateur(s): Jonathan Todd Ross
- Durée: 5 h et 47 min
- Date de publication: 2019-12-03
- Langue: Anglais
-
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Auteur(s): Perry Carpenter, Kai Roer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
Really good book, but lots of diagrams
- Écrit par Vince le 2022-12-16
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven insights into how to transform your organization's security culture and reduce human risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Think Like a Hacker
- A Sysadmin's Guide to Cybersecurity
- Auteur(s): Michael J. Melone
- Narrateur(s): Mike Wood
- Durée: 2 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage. To defend against hackers, you must first learn to think like a hacker.
-
Think Like a Hacker
- A Sysadmin's Guide to Cybersecurity
- Narrateur(s): Mike Wood
- Durée: 2 h et 59 min
- Date de publication: 2018-02-09
- Langue: Anglais
-
To defend against hackers, you must first learn to think like a hacker....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Darknet, Deep Web and Digital Shadow Worlds
- The Dark Side of the Internet
- Auteur(s): Benno Winther
- Narrateur(s): Rich Brennan
- Durée: 4 h et 26 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The internet we use every day is just the surface. Beneath it lies a vast, hidden structure filled with secrets, risks, and power plays. In this concealed world, hacker groups, secret markets, and encrypted networks operate in the shadows, where legal and illegal forces collide in complex and often dangerous ways. This audiobook takes you deep into the digital underworld and unlocks doors that are rarely opened. It explores how the Darknet came into existence, how cryptocurrencies fuel its ecosystem, and why anonymity is essential for activists, criminals, and even government entities.
-
Darknet, Deep Web and Digital Shadow Worlds
- The Dark Side of the Internet
- Narrateur(s): Rich Brennan
- Durée: 4 h et 26 min
- Date de publication: 2025-12-29
- Langue: Anglais
-
The internet we use every day is just the surface. Beneath it lies a vast, hidden structure filled with secrets, risks, and power plays. In this concealed world, hacker groups, secret markets, and encrypted networks operate in the shadows.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Beginners Guide to Hacking and Cyber Security: Written by former Army Cyber Security Analyst and Federal Agent
- Information Technology by Sam
- Auteur(s): Samuel Castro
- Narrateur(s): Devon Michael Scott
- Durée: 2 h et 33 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Welcome to the first and only book you will ever need on the topic of cyber law and cyber security. learn hacking techniques, cyber law, and white hat operations. Perfect for Beginners: If you’re brand new or an expert in cyber security, you’ll still find this guide a solid purchase to add to your skill set, develop new skills and techniques, or revamp old ones and sharpen yourself with cyber security and cyber law.
-
Beginners Guide to Hacking and Cyber Security: Written by former Army Cyber Security Analyst and Federal Agent
- Information Technology by Sam
- Narrateur(s): Devon Michael Scott
- Durée: 2 h et 33 min
- Date de publication: 2019-06-13
- Langue: Anglais
-
Welcome to the first and only book you will ever need on the topic of cyber law and cyber security. learn hacking techniques, cyber law, and white hat operations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
iPhone 15 for Seniors Made Easy
- Step-by-Step, Hassle-Free Guide to Safety, Security, Improved Technical Skills and FUN
- Auteur(s): Kenneth Overtech
- Narrateur(s): Melissa Costea
- Durée: 5 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Have you ever felt left behind by the rapid changes in technology? Tired of relying on others to solve your device dilemmas? Whether for yourself or a loved one, mastering the iPhone 15 is easier than you think! This simple guide is tailored specifically for seniors, offering clear, easy-to-follow instructions with a touch of humor.
-
iPhone 15 for Seniors Made Easy
- Step-by-Step, Hassle-Free Guide to Safety, Security, Improved Technical Skills and FUN
- Narrateur(s): Melissa Costea
- Durée: 5 h
- Date de publication: 2024-11-20
- Langue: Anglais
-
Have you ever felt left behind by the rapid changes in technology? Tired of relying on others to solve your device dilemmas? Whether for yourself or a loved one, mastering the iPhone 15 is easier than you think!
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Date de publication: 2024-05-28
- Langue: Anglais
-
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
La historia de Internet: Desde sus inicios hasta 2025
- Auteur(s): Sam Zuker
- Narrateur(s): Susan Tally
- Durée: 3 h et 44 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Internet se erige como uno de los inventos más transformadores de la humanidad, que altera fundamentalmente la forma en que nos comunicamos, trabajamos, aprendemos y vivimos.
-
La historia de Internet: Desde sus inicios hasta 2025
- Narrateur(s): Susan Tally
- Durée: 3 h et 44 min
- Date de publication: 2026-01-14
- Langue: Espagnol
-
Internet se erige como uno de los inventos más transformadores de la humanidad, que altera fundamentalmente la forma en que nos comunicamos, trabajamos, aprendemos y vivimos.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Mastering Cloud Architecture
- Strategies and Best Practices for Scalability, Cost Savings, and Security: Cloud-Based Infrastructure for High Availability, Performance, and Cost Optimization
- Auteur(s): Bruno Dossantos
- Narrateur(s): Brian Morrow
- Durée: 2 h et 44 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cloud computing has transformed the way we think about technology infrastructure and application deployment. The benefits of cloud computing, such as scalability, cost savings, and flexibility, have made it a popular choice for organizations of all sizes. This book aims to provide an in-depth understanding of cloud computing architecture, covering the core concepts, principles, and best practices. It will help you gain a comprehensive understanding of cloud computing, from the basics of virtualization to advanced topics such as cloud-native architecture, AI, and edge computing.
-
Mastering Cloud Architecture
- Strategies and Best Practices for Scalability, Cost Savings, and Security: Cloud-Based Infrastructure for High Availability, Performance, and Cost Optimization
- Narrateur(s): Brian Morrow
- Durée: 2 h et 44 min
- Date de publication: 2023-11-13
- Langue: Anglais
-
Cloud computing has transformed the way we think about technology infrastructure and application deployment. The benefits of cloud computing, such as scalability, cost savings, and flexibility, have made it a popular choice for organizations of all sizes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- Auteur(s): Anthony Hack
- Narrateur(s): Jordan Gunner
- Durée: 3 h et 18 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook...Hacking is a very complicated series of processes that take a lot of effort and there are many things that you will need to learn. Hopefully, this audiobook will give you the most basic information so that you will be able to do this properly.
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- Narrateur(s): Jordan Gunner
- Durée: 3 h et 18 min
- Date de publication: 2020-02-07
- Langue: Anglais
-
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-