Computer Security
-
-
Cybersecurity Program Best Practices
- Auteur(s): United States Department of Labor
- Narrateur(s): Tom Brooks
- Durée: 1 h et 13 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
ERISA-covered plans often hold millions of dollars or more in assets and maintain personal data on participants, which can make them tempting targets for cyber-criminals. Responsible plan fiduciaries have an obligation to ensure proper mitigation of cybersecurity risks.
-
Cybersecurity Program Best Practices
- Narrateur(s): Tom Brooks
- Durée: 1 h et 13 min
- Date de publication: 2021-07-13
- Langue: Anglais
-
ERISA-covered plans often hold millions of dollars or more in assets and maintain personal data on participants, which can make them tempting targets for cyber-criminals. Responsible plan fiduciaries have an obligation to ensure proper mitigation of cybersecurity risks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
GuíaBurros: Ciberseguridad
- Consejos para tener vidas digitales más seguras
- Auteur(s): Mónica Valle
- Narrateur(s): Carla Huélamo
- Durée: 3 h et 3 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Es una guía con consejos para tener vidas digitales más seguras y para conocer las ciberamenazas más comunes y cómo detectarlas.
-
GuíaBurros: Ciberseguridad
- Consejos para tener vidas digitales más seguras
- Narrateur(s): Carla Huélamo
- Durée: 3 h et 3 min
- Date de publication: 2021-11-24
- Langue: Espagnol
-
Es una guía con consejos para tener vidas digitales más seguras y para conocer las ciberamenazas más comunes y cómo detectarlas...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Date de publication: 2022-04-04
- Langue: Anglais
-
This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Getting Started with Cybersecurity Risk Management | Ransomware
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 1 h et 22 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Framework is organized by five key functions—identify, protect, detect, respond, and recover. These five terms provide a comprehensive way to view the lifecycle for managing cybersecurity risk. The activities listed under each function offer a good starting point for any organization, including those with limited resources to address cybersecurity challenges. They help to set priorities so that an organization gets the greatest value out of its efforts to manage ransomware risks.
-
Getting Started with Cybersecurity Risk Management | Ransomware
- Narrateur(s): Tom Brooks
- Durée: 1 h et 22 min
- Date de publication: 2022-03-30
- Langue: Anglais
-
The Framework is organized by five key functions—identify, protect, detect, respond, and recover. These five terms provide a comprehensive way to view the lifecycle for managing cybersecurity risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Evaluation of the CPSC’s NIST Cybersecurity Framework Implementation
- Auteur(s): U.S. Consumer Product Safety Commission
- Narrateur(s): Tom Brooks
- Durée: 1 h et 23 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This report evaluates the US Consumer Product Safety Commission’s (CPSC) progress in implementing the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity (CSF). The CSF provides guidelines for organizations to evaluate and improve an agency’s cybersecurity posture. This approach requires management to consider cybersecurity risks as part of the organization’s overall risk management assessment, specifically with a focus on an agency’s cybersecurity risk.
-
Evaluation of the CPSC’s NIST Cybersecurity Framework Implementation
- Narrateur(s): Tom Brooks
- Durée: 1 h et 23 min
- Date de publication: 2022-02-14
- Langue: Anglais
-
This report evaluates the US Consumer Product Safety Commission’s progress in implementing the National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (CSF). The CSF provides guidelines to evaluate an agency’s cybersecurity posture....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cybersecurity experts agree: No one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls.
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2022-01-14
- Langue: Anglais
-
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Improving Security of Open Source Software in Operational Technology and Industrial Control Systems
- Auteur(s): CISA FBI NSA Department of Treasury
- Narrateur(s): Tom Brooks
- Durée: 2 h et 28 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This fact sheet will assist with better management of risk from OSS use in OT products and increase resilience using available resources. While several resources and recommendations within this fact sheet are best suited for execution by the vendor or the critical infrastructure owner, collaboration across parties will result in less friction for operator workflows and promote a safer, more reliable system and provision of National Critical Functions.
-
Improving Security of Open Source Software in Operational Technology and Industrial Control Systems
- Narrateur(s): Tom Brooks
- Durée: 2 h et 28 min
- Date de publication: 2023-10-25
- Langue: Anglais
-
This fact sheet will assist with better management of risk from OSS use in OT products and increase resilience using available resources....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Risk Business: Second Edition
- What Leaders Need to Know About Intelligence and Risk Based Security
- Auteur(s): Levi Gundert
- Narrateur(s): Levi Gundert
- Durée: 3 h et 44 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In this book, Levi Gundert, chief security officer at Recorded Future, draws on his decades of experience to develop a comprehensive cybersecurity framework emphasizing risk over threats. The key is for the technical side of any organization to present intelligence to executives and other decision-makers in terms they understand: the language of risk. All operational outcomes must be framed in a clear, concrete way that tells a story of profit, loss, and risk reduction.
-
The Risk Business: Second Edition
- What Leaders Need to Know About Intelligence and Risk Based Security
- Narrateur(s): Levi Gundert
- Durée: 3 h et 44 min
- Date de publication: 2023-08-18
- Langue: Anglais
-
In this book, Levi Gundert, chief security officer at Recorded Future, draws on his decades of experience to develop a comprehensive cybersecurity framework emphasizing risk over threats....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Digital Armor: Business Cyber Defense Strategies
- Defending the Digital Frontline: Cybersecurity Tactics for Businesses
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 22 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In the rapidly evolving digital age, cybersecurity has emerged as a cornerstone of business resilience and continuity. "The Digital Armor: Business Cyber Defense Strategies - Defending the Digital Frontline: Cybersecurity Tactics for Businesses" by Tom Brooks is a comprehensive guide designed to navigate the complex cybersecurity landscape facing today's organizations. This book offers a multi-faceted approach to fortify defenses, emphasizing the integration of technology, policy, and education to safeguard against the myriad cyber threats that businesses encounter.
-
The Digital Armor: Business Cyber Defense Strategies
- Defending the Digital Frontline: Cybersecurity Tactics for Businesses
- Narrateur(s): Tom Brooks
- Durée: 2 h et 22 min
- Date de publication: 2024-02-22
- Langue: Anglais
-
This audiobook offers a multi-faceted approach to fortify defenses, emphasizing the integration of technology, policy, and education to safeguard against the myriad cyber threats that businesses encounter.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
National Cybersecurity Strategy
- Auteur(s): The White House
- Narrateur(s): Tom Brooks
- Durée: 3 h et 27 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This National Cybersecurity Strategy audiobook details the comprehensive approach my administration is taking to better secure cyberspace and ensure the United States is in the strongest possible position to realize all the benefits and potential of our digital future.
-
National Cybersecurity Strategy
- Narrateur(s): Tom Brooks
- Durée: 3 h et 27 min
- Date de publication: 2023-04-03
- Langue: Anglais
-
This National Cybersecurity Strategy audiobook details the comprehensive approach my administration is taking to better secure cyberspace and ensure the United States is in the strongest possible position to realize all the benefits and potential of our digital future....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Auteur(s): Niels Starling
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security. We all think our information is at risk when actually hiding it away runs the greatest risk.
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Date de publication: 2020-12-16
- Langue: Anglais
-
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security
- Learn the Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies
- Auteur(s): Noah Zhang, Dana Onyshko
- Narrateur(s): Gary Westphalen
- Durée: 3 h et 42 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Companies that can use technology wisely and well are booming, and companies that make bad or no technology choices collapse and disappear. The cloud, smart devices, and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. The bad actors are in on this, too, and it creates a real problem right now for every individual and business.
-
Cyber Security
- Learn the Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies
- Narrateur(s): Gary Westphalen
- Durée: 3 h et 42 min
- Date de publication: 2020-10-13
- Langue: Anglais
-
Companies that can use technology wisely and well are booming, and companies that make bad or no technology choices collapse and disappear. The cloud, smart devices, and the ability to connect almost any object to the internet are an essential landscape to use....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security
- How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond
- Auteur(s): Matt Reyes
- Narrateur(s): Duke Holm
- Durée: 3 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyber attacks are a growing problem that’s affecting an increasing number of devices and people. The current numbers are staggering. Hackers create and deploy over 300,000 new malware programs every single day on networks, individual computers, and other devices. And there are nearly half a million ransomware attacks every year.
-
Cyber Security
- How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond
- Narrateur(s): Duke Holm
- Durée: 3 h et 12 min
- Date de publication: 2019-11-14
- Langue: Anglais
-
Cyber attacks are a growing problem that’s affecting an increasing number of devices and people. The current numbers are staggering. Hackers create and deploy over 300,000 new malware programs every single day on networks, individual computers, and other devices....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,10 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Psychology of Information Security
- Auteur(s): Leron Zinatullin
- Narrateur(s): Peter Silverleaf
- Durée: 2 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Based on insights gained from academic research, as well as interviews with UK-based security professionals from various sectors, The Psychology of Information Security describes how resolving conflicts between security compliance and human behavior explains the importance of careful risk management and how to align a security program with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.
-
The Psychology of Information Security
- Narrateur(s): Peter Silverleaf
- Durée: 2 h et 12 min
- Date de publication: 2018-11-27
- Langue: Anglais
-
Based on insights gained from academic research, The Psychology of Information Security describes how resolving conflicts between security compliance and human behavior explains the importance of careful risk management....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking
- What Every Beginner Needs to Know
- Auteur(s): Mark Anderson
- Narrateur(s): Trevor Carleen
- Durée: 1 h et 30 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Have you watched the news lately? They can't stop talking about hacking. It is portrayed in movies, shouted about in media headlines, and typically gets a lot of attention. In fact, in the run up to the 2016 US Presidential election, there were allegations made nearly every day that the Russians were influencing the election by hacking into American databases and systems. And who can forget Julian Assange and his infamous WikiLeaks that successfully hacked into hundreds of thousands of emails, and whose actions may have kept Hillary Clinton out of the White House.
-
Hacking
- What Every Beginner Needs to Know
- Narrateur(s): Trevor Carleen
- Durée: 1 h et 30 min
- Date de publication: 2017-01-10
- Langue: Anglais
- Have you watched the news lately? They can't stop talking about hacking. It is portrayed in movies, shouted about in media headlines, and typically gets a lot of attention....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Crisis
- It's Personal Now
- Auteur(s): William Keiper
- Narrateur(s): Pamela Almand
- Durée: 2 h et 24 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
If you access the web from a smartphone, tablet, or computer, this audiobook will add to your knowledge about social network risks, online trust and privacy, content oversharing, and smartphone addiction. Written in plain English (not geek-speak), Cyber Crisis also offers easy-to-follow steps you can take to improve your personal cyber security. You will learn at least one new thing you can do that will lower your risk of being hacked or harmed online.
-
Cyber Crisis
- It's Personal Now
- Narrateur(s): Pamela Almand
- Durée: 2 h et 24 min
- Date de publication: 2017-05-26
- Langue: Anglais
- Written in plain English (not geek-speak), Cyber Crisis offers easy-to-follow steps you can take to improve your personal cyber security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacked Again
- Auteur(s): Scott N. Schober
- Narrateur(s): John Pruden
- Durée: 3 h et 38 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
-
Hacked Again
- Narrateur(s): John Pruden
- Durée: 3 h et 38 min
- Date de publication: 2016-02-18
- Langue: Anglais
- Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The NFT 101 Beginners Guide
- Complete Investing Blueprint for Creating, Buying, Selling, and Trading Non-Fungible Tokens and Cryptocurrencies
- Auteur(s): Warren Steele
- Narrateur(s): Christopher Power
- Durée: 3 h et 37 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Finding ways to make money that doesn’t force you to directly exchange your time for money is something we all dream of, but how many of us actually make it a reality? The problem is that it’s all too easy to look on with envy at the "lucky" few who make it work, while still doing nothing in your own life to force the shift.
-
The NFT 101 Beginners Guide
- Complete Investing Blueprint for Creating, Buying, Selling, and Trading Non-Fungible Tokens and Cryptocurrencies
- Narrateur(s): Christopher Power
- Durée: 3 h et 37 min
- Date de publication: 2022-11-01
- Langue: Anglais
-
Finding ways to make money that doesn’t force you to directly exchange your time for money is something we all dream of, but how many of us actually make it a reality? The problem is that it’s all too easy to look on with envy at the "lucky" few who make it work....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Hacking Guide
- A Guide to Wireless Penetration
- Auteur(s): Lei Felsen
- Narrateur(s): Steve Baughn
- Durée: 3 h et 20 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
It's no secret that computers are insecure. Stories like the recent Facebook hack and the hacking of government agencies are just the tip of the iceberg because hacking is taking over the world. With more and more people moving online and doing almost any task that they can there, it is likely that hacking is just going to increase over time. Our personal, financial, and business information is all found online, and this is a big goldmine for hackers all throughout the world.
-
Cybersecurity Hacking Guide
- A Guide to Wireless Penetration
- Narrateur(s): Steve Baughn
- Durée: 3 h et 20 min
- Date de publication: 2020-09-22
- Langue: Anglais
-
It's no secret that computers are insecure. Stories like the recent Facebook hack and the hacking of government agencies are just the tip of the iceberg because hacking is taking over the world....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Travel Hacking Pocket Guide
- Protect Your Family and Business from Cyber Attacks
- Auteur(s): Lee Felsin
- Narrateur(s): John Taylor
- Durée: 3 h et 20 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Every chapter in this audiobook contains examples and definitions that are easy to follow and understand. You will learn the basics of hacking, how to operate and use terminal commands, followed by an extensive guide on how to perform all the steps of a penetration test.
-
The Travel Hacking Pocket Guide
- Protect Your Family and Business from Cyber Attacks
- Narrateur(s): John Taylor
- Durée: 3 h et 20 min
- Date de publication: 2020-09-22
- Langue: Anglais
-
Every chapter in this audiobook contains examples and definitions that are easy to follow and understand. You will learn the basics of hacking, how to operate and use terminal commands, followed by an extensive guide on how to perform all the steps of a penetration test....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-