Computer Security
-
-
Hacking: Computer Hacking, Security Testing, Penetration Testing, and Basic Security
- Auteur(s): Gary Hall, Erin Watson
- Narrateur(s): T. W. Ashworth
- Durée: 3 h et 4 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
Are you interested in learning about how to hack systems? Do you want to learn how to protect yourself from being hacked? Do you wish to learn the art of ethical hacking? Do you want to know the secret techniques that genius hackers use? Hacking is one of the most misunderstood cyber concepts. The majority of people think of hacking as something evil or illegal, but nothing could be farther from the truth. Indeed, hacking can be a real threat, but if you want to stop someone from hacking you, you must also learn how to hack!
-
Hacking: Computer Hacking, Security Testing, Penetration Testing, and Basic Security
- Narrateur(s): T. W. Ashworth
- Durée: 3 h et 4 min
- Date de publication: 2017-03-09
- Langue: Anglais
- Are you interested in learning about how to hack systems? Do you want to learn how to protect yourself from being hacked? Do you wish to learn the art of ethical hacking? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Auteur(s): Andy Greenberg
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Date de publication: 2012-09-17
- Langue: Anglais
- The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- Auteur(s): Taimur Ijlal
- Narrateur(s): Sean Oblak
- Durée: 1 h et 40 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced. However, this topic can be quite challenging for newcomers who want to understand the governance and cyber-security risks that AI introduces. This book assumes zero prior knowledge of AI or machine learning and explains in an easy-to-understand way how to govern and secure AI.
-
-
Love this!!
- Écrit par Cleopatra le 2025-06-25
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- Narrateur(s): Sean Oblak
- Durée: 1 h et 40 min
- Date de publication: 2022-07-15
- Langue: Anglais
-
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Cyber Security Handbook
- Prepare for, Respond to and Recover from Cyber Attacks with the It Governance Cyber Resilience Framework (CRF)
- Auteur(s): Alan Calder
- Narrateur(s): Stephen Perring
- Durée: 7 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This audiobook is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
-
The Cyber Security Handbook
- Prepare for, Respond to and Recover from Cyber Attacks with the It Governance Cyber Resilience Framework (CRF)
- Narrateur(s): Stephen Perring
- Durée: 7 h et 59 min
- Date de publication: 2021-11-05
- Langue: Anglais
-
This audiobook is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF)....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- Auteur(s): Roger A. Grimes
- Narrateur(s): Jonathan Todd Ross
- Durée: 10 h et 46 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- Narrateur(s): Jonathan Todd Ross
- Durée: 10 h et 46 min
- Date de publication: 2019-10-08
- Langue: Anglais
-
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hackers & Painters
- Big Ideas from the Computer Age
- Auteur(s): Paul Graham
- Narrateur(s): Mark Sando
- Durée: 7 h et 44 min
- Version intégrale
-
Au global5
-
Performance4
-
Histoire4
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care? Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970.
-
-
Good when talking about technical subjects
- Écrit par Maks le 2021-12-30
-
Hackers & Painters
- Big Ideas from the Computer Age
- Narrateur(s): Mark Sando
- Durée: 7 h et 44 min
- Date de publication: 2021-03-17
- Langue: Anglais
-
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- Auteur(s): Ben Buchanan
- Narrateur(s): Christopher Grove
- Durée: 11 h et 19 min
- Version intégrale
-
Au global9
-
Performance7
-
Histoire7
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
Very informative
- Écrit par Kolcza Gabor le 2025-02-23
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- Narrateur(s): Christopher Grove
- Durée: 11 h et 19 min
- Date de publication: 2020-06-30
- Langue: Anglais
-
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Auteur(s): Joseph Menn
- Narrateur(s): Jonathan Davis, Joseph Menn
- Durée: 8 h et 32 min
- Version intégrale
-
Au global24
-
Performance24
-
Histoire24
The shocking untold story of the elite secret society of hackers fighting to protect our freedom, “a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age” (The New York Times Book Review) Cult of the Dead Cow is the tale of the oldest...
-
-
Hard to get into
- Écrit par Blair C. le 2019-11-06
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Narrateur(s): Jonathan Davis, Joseph Menn
- Durée: 8 h et 32 min
- Date de publication: 2019-06-04
- Langue: Anglais
- The shocking untold story of the elite secret society of hackers fighting to protect our freedom, “a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age” (The New York Times Book Review) Cult of the Dead Cow is the tale of the oldest...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix réduit: 6,99 $ (76% de réduction)
Prix courant: 29,13 $
Cette promotion se termine dansCette promotion est terminée -
-
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Auteur(s): Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Date de publication: 2024-02-20
- Langue: Anglais
-
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Auteur(s): Kelly Shortridge, Aaron Rinehart - contributor
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
-
-
Great content but horribly annoying computer voice
- Écrit par Utilisateur anonyme le 2024-04-08
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Date de publication: 2023-11-28
- Langue: Anglais
-
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
33,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Auteur(s): Lance Henderson
- Narrateur(s): James C. Lewis
- Durée: 12 h et 57 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Nothing about Kali Linux
- Écrit par Utilisateur anonyme le 2020-01-11
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Narrateur(s): James C. Lewis
- Durée: 12 h et 57 min
- Date de publication: 2018-06-07
- Langue: Anglais
-
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Spies, Lies, and Cybercrime
- Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
- Auteur(s): Eric O'Neill
- Narrateur(s): Eric O'Neill
- Durée: 9 h et 10 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
National security strategist and former FBI counterintelligence operative Eric O’Neill exposes how nefarious cybercriminals relentlessly attempt to access your data and wallet, and arms you with his proven tactics for spotting and neutralizing cyberthreats to protect yourself, your family, and...
-
Spies, Lies, and Cybercrime
- Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
- Narrateur(s): Eric O'Neill
- Durée: 9 h et 10 min
- Date de publication: 2025-10-07
- Langue: Anglais
- National security strategist and former FBI counterintelligence operative Eric O’Neill exposes how nefarious cybercriminals relentlessly attempt to access your data and wallet, and arms you with his proven tactics for spotting and neutralizing cyberthreats to protect yourself, your family, and...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
32,62 $ ou gratuit avec l'essai de 30 jours
-
-
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global53
-
Performance45
-
Histoire45
A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Date de publication: 2014-11-11
- Langue: Anglais
- A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- Auteur(s): Razi Rais, Christina Morillo, Evan Gilman, Autres
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 5 min
- Date de publication: 2024-06-04
- Langue: Anglais
-
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- Auteur(s): Byron Tau
- Narrateur(s): Sean Patrick Hopkins
- Durée: 11 h et 6 min
- Version intégrale
-
Au global4
-
Performance3
-
Histoire3
You are being surveilled right now. This sweeping exposé reveals how the U.S. government allied with data brokers, tech companies, and advertisers to monitor us through the phones we carry and the devices in our home. “A revealing . . . startling . . . timely . . . fascinating, sometimes...
-
-
Not objective
- Écrit par Julie le 2025-11-26
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- Narrateur(s): Sean Patrick Hopkins
- Durée: 11 h et 6 min
- Date de publication: 2024-02-27
- Langue: Anglais
- You are being surveilled right now. This sweeping exposé reveals how the U.S. government allied with data brokers, tech companies, and advertisers to monitor us through the phones we carry and the devices in our home. “A revealing . . . startling . . . timely . . . fascinating, sometimes...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cloud Security for Dummies
- Auteur(s): Ted Coombs
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security for Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom up.
-
Cloud Security for Dummies
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Date de publication: 2022-03-29
- Langue: Anglais
-
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
38,97 $ ou gratuit avec l'essai de 30 jours
-
-
-
Social Engineering
- The Art of Human Hacking
- Auteur(s): Paul Wilson - foreword, Christopher Hadnagy
- Narrateur(s): A. T. Chandler
- Durée: 14 h et 52 min
- Version intégrale
-
Au global6
-
Performance4
-
Histoire4
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
-
Social Engineering
- The Art of Human Hacking
- Narrateur(s): A. T. Chandler
- Durée: 14 h et 52 min
- Date de publication: 2020-07-10
- Langue: Anglais
-
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- Auteur(s): P. W. Singer, Allan Friedman
- Narrateur(s): Sean Pratt
- Durée: 11 h et 29 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- Narrateur(s): Sean Pratt
- Durée: 11 h et 29 min
- Date de publication: 2016-01-26
- Langue: Anglais
- Best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking for Dummies, 7th Edition
- Auteur(s): Kevin Beaver CISSP
- Narrateur(s): Tom Perkins
- Durée: 11 h et 34 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
Hacking for Dummies, 7th Edition
- Narrateur(s): Tom Perkins
- Durée: 11 h et 34 min
- Date de publication: 2022-09-27
- Langue: Anglais
-
Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- Auteur(s): Douglas W. Hubbard, Richard Seiersen
- Narrateur(s): Jim Seybert
- Durée: 14 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- Narrateur(s): Jim Seybert
- Durée: 14 h et 5 min
- Date de publication: 2023-04-25
- Langue: Anglais
-
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-