Computer Security
-
-
Cybersecurity Risk Management
- Mastering the Fundamentals Using the NIST Cybersecurity Framework
- Auteur(s): Cynthia Brumfield, Brian Haugli - contributor
- Narrateur(s): Ulf Bjorklund
- Durée: 5 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers an up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers listeners overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks.
-
Cybersecurity Risk Management
- Mastering the Fundamentals Using the NIST Cybersecurity Framework
- Narrateur(s): Ulf Bjorklund
- Durée: 5 h et 55 min
- Date de publication: 2025-09-16
- Langue: Anglais
-
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers an exploration of the fundamentals of cybersecurity risk planning and management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,47 $ ou gratuit avec l'essai de 30 jours
-
-
-
Generative AI, Cybersecurity, and Ethics
- Auteur(s): Ray Islam
- Narrateur(s): Ray Greenley
- Durée: 12 h et 14 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Generative AI, Cybersecurity, and Ethics provides concise yet thorough insights into the dual role artificial intelligence plays in both enabling and safeguarding against cyber threats. Presented in an engaging and approachable style, this timely book explores critical aspects of the intersection of AI and cybersecurity while emphasizing responsible development and application.
-
Generative AI, Cybersecurity, and Ethics
- Narrateur(s): Ray Greenley
- Durée: 12 h et 14 min
- Date de publication: 2025-10-28
- Langue: Anglais
-
Generative AI, Cybersecurity, and Ethics provides concise yet thorough insights into the dual role artificial intelligence plays in both enabling and safeguarding against cyber threats
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Reality Hacked
- Inside the Hidden World of Bot Farms, Fake News, and Digital Manipulation
- Auteur(s): Sergey Berezkin
- Narrateur(s): Justin Hewett
- Durée: 1 h et 43 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Reality Hacked pulls back the curtain on the hidden systems that shape what we see and believe online. It shows how bot farms amplify outrage, how “firehose of falsehood” tactics flood social media with conflicting stories, and how artificial intelligence now manufactures entire people, movements, and events from data.
-
Reality Hacked
- Inside the Hidden World of Bot Farms, Fake News, and Digital Manipulation
- Narrateur(s): Justin Hewett
- Durée: 1 h et 43 min
- Date de publication: 2025-12-09
- Langue: Anglais
-
Every day, millions of invisible accounts and automated networks fight for your attention. Some sell products. Some push politics. Many exist only to keep you angry, distracted, or uncertain.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security Program and Policy Using NIST Cybersecurity Framework
- NIST Cybersecurity Framework (CSF), Book 2
- Auteur(s): Bruce Brown, convocourses
- Narrateur(s): Kim Pepper
- Durée: 3 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In today's digital age, safeguarding your organization's assets from cyber threats is paramount. Equip yourself with the knowledge and tools necessary with Cyber Security Program and Policy Using NIST Cybersecurity Framework by seasoned cybersecurity professionals. This guide steers you through the process of creating robust, professional documents and procedures designed to protect your data and digital assets from evolving cyber risks.
-
Cyber Security Program and Policy Using NIST Cybersecurity Framework
- NIST Cybersecurity Framework (CSF), Book 2
- Narrateur(s): Kim Pepper
- Série: NIST Cybersecurity Framework, Livre 2
- Durée: 3 h et 29 min
- Date de publication: 2023-09-25
- Langue: Anglais
-
This guide steers you through the process of creating robust, professional documents and procedures designed to protect your data and digital assets from evolving cyber risks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- Auteur(s): Peter Aiken, Todd Harbour
- Narrateur(s): Susan Hanfield
- Durée: 9 h et 43 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance. Our Digital Civics Framework presents a guide to increasing the data literacy of billions of citizens. We outline the data knowledge that society needs and propose exercises that will help citizens interact productively within a data-driven society.
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- Narrateur(s): Susan Hanfield
- Durée: 9 h et 43 min
- Date de publication: 2022-05-16
- Langue: Anglais
-
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity
- The Insights You Need from Harvard Business Review
- Auteur(s): Harvard Business Review, Alex Blau, Andrew Burt, Autres
- Narrateur(s): Jonathan Todd Ross
- Durée: 2 h et 56 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT specialists. Improving and increasing data security practices and identifying suspicious activity is everyone's responsibility, from the boardroom to the break room.
-
-
Expected to be better
- Écrit par Anonymous le 2025-04-07
-
Cybersecurity
- The Insights You Need from Harvard Business Review
- Narrateur(s): Jonathan Todd Ross
- Série: HBR Insights Series
- Durée: 2 h et 56 min
- Date de publication: 2019-09-17
- Langue: Anglais
-
No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,81 $ ou gratuit avec l'essai de 30 jours
-
-
-
We Are Anonymous
- Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
- Auteur(s): Parmy Olson
- Narrateur(s): Abby Craden
- Durée: 14 h et 16 min
- Version intégrale
-
Au global13
-
Performance11
-
Histoire11
A thrilling, exclusive exposè of the hacker collectives Anonymous and LulzSec. We Are Anonymous is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds -- and the ultimate betrayal...
-
-
Not an Insider Perspective
- Écrit par Heather Humble le 2023-08-28
-
We Are Anonymous
- Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
- Narrateur(s): Abby Craden
- Durée: 14 h et 16 min
- Date de publication: 2012-06-05
- Langue: Anglais
- A thrilling, exclusive exposè of the hacker collectives Anonymous and LulzSec. We Are Anonymous is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds -- and the ultimate betrayal...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,28 $ ou gratuit avec l'essai de 30 jours
-
-
-
Circuit Engineering + Cryptography + CompTIA A+
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 23 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Is circuit engineering what you want to learn? Always wondered how one becomes an electrical engineer? Do semiconductors and circuit boards interest you? Download Circuit Engineering + Cryptography + CompTIA A+ to discover everything you need to know about basic electronics. You'll learn step by step how to increase your electrical skills, the anatomy of a circuit, and all your basic knowledge in one download!
-
Circuit Engineering + Cryptography + CompTIA A+
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 23 min
- Date de publication: 2016-03-02
- Langue: Anglais
- You'll learn step by step how to increase your electrical skills, the anatomy of a circuit, and all your basic knowledge in one download....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Practical Cloud Security
- A Guide for Secure Design and Deployment (2nd Edition)
- Auteur(s): Chris Dotson
- Narrateur(s): Stephen Caffrey
- Durée: 11 h et 18 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.
-
Practical Cloud Security
- A Guide for Secure Design and Deployment (2nd Edition)
- Narrateur(s): Stephen Caffrey
- Durée: 11 h et 18 min
- Date de publication: 2024-09-24
- Langue: Anglais
-
In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Auteur(s): Raymond Phillips
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself. I am sure if you are considering this book, you too have a reason, but going through this process, I have learned a few valuable lessons. This book is all about those lessons, so you don't have to learn on the go as I had to. Instead, you can use this book as a guide and just follow the step by step process and see yourself disappear from the big World Wide Web.
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Date de publication: 2016-12-14
- Langue: Anglais
- Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- Auteur(s): Jeremiah Talamantes
- Narrateur(s): Joe Smith
- Durée: 4 h et 18 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration. Learn how to conduct a Physical Red Team Operation with precision, confidence, and value. Whether the listener will be hired at some point to penetrate security or simply trying to harden his or her own defenses, this audiobook is essential.
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- Narrateur(s): Joe Smith
- Durée: 4 h et 18 min
- Date de publication: 2019-12-10
- Langue: Anglais
-
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Secret Key Cryptography
- Ciphers, from Simple to Unbreakable
- Auteur(s): Frank Rubin
- Narrateur(s): Christopher Kendrick
- Durée: 16 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Secret Key Cryptography gives you a toolbox of cryptographic techniques and secret key methods. The audiobook’s simple, non-technical language is easy to understand and is accessible for any listener even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches including a never-before-seen way to implement the uncrackable one-time pad algorithm. Whoever you are, this audiobook is for you!
-
Secret Key Cryptography
- Ciphers, from Simple to Unbreakable
- Narrateur(s): Christopher Kendrick
- Durée: 16 h et 49 min
- Date de publication: 2023-01-26
- Langue: Anglais
-
Explore the fascinating and rich world of Secret Key Cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes including 30 unbreakable methods.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Language of Deception
- Weaponizing Next Generation AI
- Auteur(s): Justin Hutchens
- Narrateur(s): Mike Chamberlain
- Durée: 10 h et 38 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes. In the book, you will explore the history of social engineering and social robotics, the psychology of deception, considerations of machine sentience and consciousness, and the history of how technology has been weaponized in the past.
-
The Language of Deception
- Weaponizing Next Generation AI
- Narrateur(s): Mike Chamberlain
- Durée: 10 h et 38 min
- Date de publication: 2024-02-20
- Langue: Anglais
-
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Secret Life
- Three True Stories of the Digital Age
- Auteur(s): Andrew O'Hagan
- Narrateur(s): Liam Gerrard
- Durée: 8 h et 2 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The slippery online ecosystem is the perfect breeding ground for identities: true, false, and in between. The Internet shorthand IRL - "in real life" - now seems naïve. We no longer question the reality of online experiences but the reality of selfhood in the digital age. In The Secret Life, the essayist and novelist Andrew O'Hagan issues three bulletins from the porous border between cyberspace and IRL.
-
The Secret Life
- Three True Stories of the Digital Age
- Narrateur(s): Liam Gerrard
- Durée: 8 h et 2 min
- Date de publication: 2017-10-10
- Langue: Anglais
- The slippery online ecosystem is the perfect breeding ground for identities: true, false, and in between. The Internet shorthand IRL - "in real life" - now seems naïve....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
35,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
AI Security
- Using Machine Learning Techniques to Detect and Counter Cyber Threats
- Auteur(s): Dr. Arley Ballenger
- Narrateur(s): Antoine Paden
- Durée: 33 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
AI Security: Using Machine Learning Techniques to Detect and Counter Cyber Threats focuses on the application of artificial intelligence, particularly machine learning, to enhance cybersecurity. The book is divided into several sections that cover various aspects of AI security.
-
AI Security
- Using Machine Learning Techniques to Detect and Counter Cyber Threats
- Narrateur(s): Antoine Paden
- Durée: 33 min
- Date de publication: 2025-06-09
- Langue: Anglais
-
AI Security: Using Machine Learning Techniques to Detect and Counter Cyber Threats focuses on the application of artificial intelligence, particularly machine learning, to enhance cybersecurity. The book is divided into several sections that cover various aspects of AI security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Practical Guide to GDPR
- Auteur(s): David Cauchi
- Narrateur(s): Dean Collins
- Durée: 1 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
A practical guide to the EU General Data Protection Regulation (GDPR). GDPR is no quick fix, nor a project with a timeline that ends on May 25, 2018. GDPR is an ongoing process that should lead organizations to achieve and maintain a high level of data-protection compliance and culture.
-
A Practical Guide to GDPR
- Narrateur(s): Dean Collins
- Durée: 1 h et 6 min
- Date de publication: 2018-12-10
- Langue: Anglais
-
A practical guide to the EU General Data Protection Regulation (GDPR)....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide
- NIST 800 Cybersecurity, Book 3
- Auteur(s): Bruce Brown
- Narrateur(s): Layne Ihde
- Durée: 3 h et 44 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Whether you're a seasoned professional looking to expand your knowledge or a newcomer seeking to kickstart your cybersecurity career, RMF Security Control Assessor by Bruce Brown, CISSP, is the ultimate guide to mastering the art of cybersecurity assessments.
-
RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide
- NIST 800 Cybersecurity, Book 3
- Narrateur(s): Layne Ihde
- Série: NIST 800 Cybersecurity, Livre 3
- Durée: 3 h et 44 min
- Date de publication: 2023-05-10
- Langue: Anglais
-
Whether you're a seasoned professional looking to expand your knowledge or a newcomer seeking to kickstart your cybersecurity career, RMF Security Control Assessor by Bruce Brown, CISSP, is the ultimate guide to mastering the art of cybersecurity assessments....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
API Security in Action
- Auteur(s): Neil Madden
- Narrateur(s): Marianne Sheehan
- Durée: 20 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
A web API is an efficient way to communicate with an application or service. However, this convenience opens your systems to new security risks. API Security in Action gives you the skills to build strong, safe APIs you can confidently expose to the world.
-
API Security in Action
- Narrateur(s): Marianne Sheehan
- Durée: 20 h et 5 min
- Date de publication: 2021-07-14
- Langue: Anglais
-
A web API is an efficient way to communicate with an application or service. However, this convenience opens your systems to new security risks. API Security in Action gives you the skills to build strong, safe APIs you can confidently expose to the world...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Auteur(s): Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What to Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour—from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria—recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes.
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Date de publication: 2023-11-21
- Langue: Anglais
-
A team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Auteur(s): Lester Evans
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? You’re not alone. Half-baked products and services that chip away at your sense of ownership, independence and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers.
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Date de publication: 2019-02-05
- Langue: Anglais
-
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-