Computer Security
-
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Auteur(s): Kevin Poulsen
- Narrateur(s): Eric Michael Summerer
- Durée: 8 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Narrateur(s): Eric Michael Summerer
- Durée: 8 h et 8 min
- Date de publication: 2015-02-17
- Langue: Anglais
- The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,04 $
-
-
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Auteur(s): Kelly Shortridge, Aaron Rinehart - contributor
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
-
-
Great content but horribly annoying computer voice
- Écrit par Utilisateur anonyme le 2024-04-08
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Date de publication: 2023-11-28
- Langue: Anglais
-
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 33,40 $
-
-
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- Auteur(s): David E. Sanger
- Narrateur(s): Robertson Dean
- Durée: 12 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
Great deep dive into cyberweapons
- Écrit par Alek Luopa le 2018-09-14
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- Narrateur(s): Robertson Dean
- Durée: 12 h et 53 min
- Date de publication: 2018-06-19
- Langue: Anglais
-
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,22 $
-
-
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- Auteur(s): Glenn Greenwald
- Narrateur(s): L. J. Ganser
- Durée: 9 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- Narrateur(s): L. J. Ganser
- Durée: 9 h et 49 min
- Date de publication: 2014-08-19
- Langue: Anglais
- Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $
-
-
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- Auteur(s): Taimur Ijlal
- Narrateur(s): Sean Oblak
- Durée: 1 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced. However, this topic can be quite challenging for newcomers who want to understand the governance and cyber-security risks that AI introduces. This book assumes zero prior knowledge of AI or machine learning and explains in an easy-to-understand way how to govern and secure AI.
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- Narrateur(s): Sean Oblak
- Durée: 1 h et 40 min
- Date de publication: 2022-07-15
- Langue: Anglais
-
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- Auteur(s): Jeremiah Talamantes
- Narrateur(s): Joe Smith
- Durée: 4 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration. Learn how to conduct a Physical Red Team Operation with precision, confidence, and value. Whether the listener will be hired at some point to penetrate security or simply trying to harden his or her own defenses, this audiobook is essential.
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- Narrateur(s): Joe Smith
- Durée: 4 h et 18 min
- Date de publication: 2019-12-10
- Langue: Anglais
-
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
Zero Trust Architecture
- Networking Technology: Security
- Auteur(s): Cindy Green-Ortiz, Brandon Fowler, David Houck, Autres
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Zero Trust Architecture
- Networking Technology: Security
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Date de publication: 2024-04-11
- Langue: Anglais
-
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,27 $
-
-
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Auteur(s): Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Date de publication: 2024-02-20
- Langue: Anglais
-
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $
-
-
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- Auteur(s): Bruce Schneier
- Narrateur(s): Roger Wayne
- Durée: 8 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
My favourite of last ten books from Audible
- Écrit par Hermes le 2019-08-06
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- Narrateur(s): Roger Wayne
- Durée: 8 h et 6 min
- Date de publication: 2018-11-20
- Langue: Anglais
-
Everything is a computer. Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53 $
-
-
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover everything you need to know about hacking. Step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one download! You need to get it now to know what's inside, as it can't be shared here!
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Date de publication: 2015-12-21
- Langue: Anglais
- Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34 $
-
-
-
Ransom War
- How Cyber Crime Became a Threat to National Security
- Auteur(s): Max Smeets
- Narrateur(s): Walter Dixon
- Durée: 6 h et 24 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This timely book explores the alarming rise of ransomware: malicious software blocking users from their systems or data until they've paid money to regain access or to prevent the release of sensitive information. High-profile British examples of the twenty-first century have targeted national libraries and healthcare organizations; in the US, hackers of Pennsylvania's Lehigh Valley Health Network held patient data hostage—when their demands went unmet, they published topless photographs of women with breast cancer.
-
Ransom War
- How Cyber Crime Became a Threat to National Security
- Narrateur(s): Walter Dixon
- Durée: 6 h et 24 min
- Date de publication: 2025-05-27
- Langue: Anglais
-
This timely book explores the alarming rise of ransomware: malicious software blocking users from their systems or data until they've paid money to regain access or to prevent the release of sensitive information.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $
-
-
-
The Fundamentals of Digital Forensics
- Uncovering the Digital Truth
- Auteur(s): Eric Waldrep
- Narrateur(s): David Karnes
- Durée: 2 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In an age where almost everything we do leaves a digital footprint, the field of digital forensics has never been more important. From tracking down cybercriminals to recovering critical data, digital forensics is at the forefront of solving modern-day crimes and protecting sensitive information.
-
The Fundamentals of Digital Forensics
- Uncovering the Digital Truth
- Narrateur(s): David Karnes
- Durée: 2 h et 4 min
- Date de publication: 2024-12-12
- Langue: Anglais
-
In an age where almost everything we do leaves a digital footprint, the field of digital forensics has never been more important. From tracking down cybercriminals to recovering critical data, digital forensics is at the forefront of solving modern-day crimes and protecting sensitive information.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- Auteur(s): Marc Goodman
- Narrateur(s): Robertson Dean, Marc Goodman
- Durée: 20 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
Made Me Paranoid From The Beginning
- Écrit par Tariq Rana le 2024-03-27
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- Narrateur(s): Robertson Dean, Marc Goodman
- Durée: 20 h et 9 min
- Date de publication: 2015-02-24
- Langue: Anglais
-
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 46,31 $
-
-
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Auteur(s): Perry Carpenter, Kai Roer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
Really good book, but lots of diagrams
- Écrit par Vince le 2022-12-16
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven insights into how to transform your organization's security culture and reduce human risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $
-
-
-
The Little Cybersecurity Book, Part 1
- Auteur(s): Thomas Johnston
- Narrateur(s): Benji Gillespie
- Durée: 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you looking to greatly grow your understanding of Cybersecurity? Here is an author with two decades of Corporate America experience at Fortune 30 companies. This listen is a powerful journey into cybersecurity, fluency in the language of risk, and expanding a predictive mindset. You will be envisioning solutions, programs, and conversations before you can put it down.
-
The Little Cybersecurity Book, Part 1
- Narrateur(s): Benji Gillespie
- Durée: 36 min
- Date de publication: 2025-04-17
- Langue: Anglais
-
Are you looking to greatly grow your understanding of Cybersecurity? Here is an author with two decades of Corporate America experience at Fortune 30 companies. This listen is a powerful journey into cybersecurity, fluency in the language of risk, and expanding a predictive mindset.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95 $
-
-
-
Surveillance Valley
- The Secret Military History of the Internet
- Auteur(s): Yasha Levine
- Narrateur(s): LJ Ganser
- Durée: 10 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
A History Lesson Everyone Should Know
- Écrit par JJHicks le 2024-04-15
-
Surveillance Valley
- The Secret Military History of the Internet
- Narrateur(s): LJ Ganser
- Durée: 10 h et 42 min
- Date de publication: 2018-03-20
- Langue: Anglais
- In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26 $
-
-
-
Cybersecurity Essentials
- Auteur(s): Charles J. Brooks, Christopher Grow, Philip Craig, Autres
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Awful as an e-book
- Écrit par Mac le 2021-07-25
-
Cybersecurity Essentials
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Date de publication: 2018-10-30
- Langue: Anglais
-
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53 $
-
-
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Auteur(s): Jennifer Bleam
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
What value does managed security bring when there’s no way to promise ROI? How do you convince small business owners to part with their hard-earned revenue when they don’t feel vulnerable to a cyberattack? What is the best way to mitigate your clients’ risk without feeling dishonest or using slimy sales tactics? And could someone please demystify sales and make it easy? This book is the answer to all those questions and more. Forged in the steel of real-world MSP successes and failures, you’ll learn how to sell cybersecurity, simply and easily—even for the techiest tech in the industry.
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Date de publication: 2023-09-18
- Langue: Anglais
-
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
A Beginner’s Guide to Digital Prepping & Practical Cybersecurity
- Simple Steps to Protect Your Data, Prevent Hacking, and Secure Your Family Online (Preparedness Collection, Book 3)
- Auteur(s): Urban Readiness Collective, Silver Valley Publishing
- Narrateur(s): Ben Staab
- Durée: 2 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Protect Your Digital Life in Minutes—Even If You’re Not Tech-Savvy! Every click, every login, and every online interaction exposes you to digital threats—identity theft, hacking, and scams that can compromise your personal and financial security. But what if protecting yourself was simpler than you thought?" A Beginner’s Guide to Digital Prepping & Practical Cybersecurity" cuts through the confusion, offering clear, step-by-step strategies to safeguard your accounts, secure your family’s digital footprint, and prevent cyber threats—without requiring advanced technical skills.
-
A Beginner’s Guide to Digital Prepping & Practical Cybersecurity
- Simple Steps to Protect Your Data, Prevent Hacking, and Secure Your Family Online (Preparedness Collection, Book 3)
- Narrateur(s): Ben Staab
- Durée: 2 h et 42 min
- Date de publication: 2025-05-06
- Langue: Anglais
-
Protect Your Digital Life in Minutes—Even If You’re Not Tech-Savvy! Every click, every login, and every online interaction exposes you to digital threats—identity theft, hacking, and scams that can compromise your personal and financial security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Auteur(s): George Finney, John Kindervag - foreword
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Date de publication: 2022-10-04
- Langue: Anglais
-
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $
-