Computer Security
-
-
A Practical Guide to GDPR
- Auteur(s): David Cauchi
- Narrateur(s): Dean Collins
- Durée: 1 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
A practical guide to the EU General Data Protection Regulation (GDPR). GDPR is no quick fix, nor a project with a timeline that ends on May 25, 2018. GDPR is an ongoing process that should lead organizations to achieve and maintain a high level of data-protection compliance and culture.
-
A Practical Guide to GDPR
- Narrateur(s): Dean Collins
- Durée: 1 h et 6 min
- Date de publication: 2018-12-10
- Langue: Anglais
-
A practical guide to the EU General Data Protection Regulation (GDPR)....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- Auteur(s): Perry Carpenter, Kevin Mitnick - foreword
- Narrateur(s): Stephen Bel Davies
- Durée: 12 h et 20 min
- Version intégrale
-
Au global4
-
Performance4
-
Histoire4
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Good book but....
- Écrit par Anonymous le 2025-07-04
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- Narrateur(s): Stephen Bel Davies
- Durée: 12 h et 20 min
- Date de publication: 2020-07-21
- Langue: Anglais
-
Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness training programs that drive secure behaviors and culture change....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide
- NIST 800 Cybersecurity, Book 3
- Auteur(s): Bruce Brown
- Narrateur(s): Layne Ihde
- Durée: 3 h et 44 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Whether you're a seasoned professional looking to expand your knowledge or a newcomer seeking to kickstart your cybersecurity career, RMF Security Control Assessor by Bruce Brown, CISSP, is the ultimate guide to mastering the art of cybersecurity assessments.
-
RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide
- NIST 800 Cybersecurity, Book 3
- Narrateur(s): Layne Ihde
- Série: NIST 800 Cybersecurity, Livre 3
- Durée: 3 h et 44 min
- Date de publication: 2023-05-10
- Langue: Anglais
-
Whether you're a seasoned professional looking to expand your knowledge or a newcomer seeking to kickstart your cybersecurity career, RMF Security Control Assessor by Bruce Brown, CISSP, is the ultimate guide to mastering the art of cybersecurity assessments....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Auteur(s): Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What to Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour—from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria—recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes.
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Date de publication: 2023-11-21
- Langue: Anglais
-
A team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- Auteur(s): Chris Moschovitis
- Narrateur(s): Sean Pratt
- Durée: 9 h et 9 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Really excellent guide very well read
- Écrit par Joel C LaRusic le 2019-08-29
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- Narrateur(s): Sean Pratt
- Durée: 9 h et 9 min
- Date de publication: 2018-06-26
- Langue: Anglais
-
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Auteur(s): Lester Evans
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? You’re not alone. Half-baked products and services that chip away at your sense of ownership, independence and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers.
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Date de publication: 2019-02-05
- Langue: Anglais
-
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Auteur(s): L.D. Knowings
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
You're not a tech wizard, and you don't need to be. This book speaks directly to you the concerned netizen, the proactive parent, the small business owner, or the budding entrepreneur. It's designed to break down the complexities of cybersecurity into something you can understand and apply.
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Date de publication: 2024-06-05
- Langue: Anglais
-
Worried about hackers? Fight back with confidence! Discover straightforward steps to safeguard your online presence perfect for non-techies and pros alike.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- Auteur(s): Anthony Hack
- Narrateur(s): Robert Plank
- Durée: 3 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking. You don't hear about the ethical hacking in the news, but there are people out there with the same job description fighting the malicious hackers daily, and they get the bad rep.
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- Narrateur(s): Robert Plank
- Durée: 3 h et 29 min
- Date de publication: 2020-03-25
- Langue: Anglais
-
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Auteur(s): Jack Jones
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want, do what you want, and buy whatever you want. But there is so much more to the deep web than the Hollywood picture of a lawless frontier land. Sure, there are illicit elements to it. It can be a dangerous place if you don't know what you are doing. But, with all that, it should be remembered what the deep web is all about - it's about freedom of speech in a world of censorship and political correctness.
-
-
Provides some practical information
- Écrit par Mary-Anne le 2018-12-15
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Date de publication: 2017-07-14
- Langue: Anglais
- It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want and buy whatever you want....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: 2 Books in 1 Bargain
- The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
- Auteur(s): Miles Price
- Narrateur(s): Matyas Job Gombos
- Durée: 2 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Inside this audiobook, we aim to show you the importance of staying on top of this threat by learning how to hack. While it is true that hackers have received a bad rep over the years, mostly due to biased media reporting, not all hackers have criminal intentions. This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks.
-
Hacking: 2 Books in 1 Bargain
- The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
- Narrateur(s): Matyas Job Gombos
- Durée: 2 h et 59 min
- Date de publication: 2018-02-23
- Langue: Anglais
-
This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
If It's Smart, It's Vulnerable
- Auteur(s): Mikko Hypponen
- Narrateur(s): Rich Miller
- Durée: 7 h et 32 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
All our devices and gadgets—from our refrigerators to our home security systems—are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing.
-
If It's Smart, It's Vulnerable
- Narrateur(s): Rich Miller
- Durée: 7 h et 32 min
- Date de publication: 2022-09-27
- Langue: Anglais
-
Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Auteur(s): Perry Carpenter, Kai Roer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
Really good book, but lots of diagrams
- Écrit par Vince le 2022-12-16
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven insights into how to transform your organization's security culture and reduce human risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Auteur(s): Aram Sinnreich, Jesse Gilbert
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Date de publication: 2024-04-30
- Langue: Anglais
-
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Der große Cyberangriff
- Bist du vorbereitet?
- Auteur(s): R. Richter
- Narrateur(s): Pierre Huber
- Durée: 4 h et 14 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In diesem Buch wird gezeigt, wie du dich gegen die Gefahren eines Cyberangriffs wappnest. Mit klaren Analysen, praktischen Tipps – von Cyberhygiene über Notfallvorräte bis hin zu psychologischer Resilienz – und einer sofort anwendbaren Notfall-Schnellberatung wirst du für die Herausforderung einer digitalen Krise gerüstet!
-
Der große Cyberangriff
- Bist du vorbereitet?
- Narrateur(s): Pierre Huber
- Durée: 4 h et 14 min
- Date de publication: 2025-11-24
- Langue: Allemand
-
In diesem Buch wird gezeigt, wie du dich gegen die Gefahren eines Cyberangriffs wappnest. Mit klaren Analysen, praktischen Tipps und einer sofort anwendbaren Notfall-Schnellberatung wirst du für die Herausforderung einer digitalen Krise gerüstet!
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Dark Web and Scams
- A Guide for Personal Cybersecurity
- Auteur(s): Ivette Smith
- Narrateur(s): Mike Martinez
- Durée: 4 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Dark Web and Scams by Ivette Ibarra Smith is an in-depth guide to understanding the dark web and various cyber scams, aiming to improve personal cybersecurity. The book covers several topics, starting with an exploration of the dark web—demystifying its role as both a space for illegal activities and a haven for privacy-focused individuals such as journalists and whistleblowers.
-
The Dark Web and Scams
- A Guide for Personal Cybersecurity
- Narrateur(s): Mike Martinez
- Durée: 4 h et 5 min
- Date de publication: 2025-03-10
- Langue: Anglais
-
The Dark Web and Scams by Ivette Ibarra Smith is an in-depth guide to understanding the dark web and various cyber scams, aiming to improve personal cybersecurity.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital for Good
- Raising Kids to Thrive in an Online World
- Auteur(s): Richard Culatta
- Narrateur(s): Adam Verner
- Durée: 5 h et 58 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Technology can be a powerful tool for learning, for solving humanity's toughest problems, and for bringing us closer together. How can we raise healthy kids who know how to take advantage of the good technology can bring to their lives, while avoiding the bad? It's time to start a new conversation. Digital for Good offers a refreshingly positive framework for preparing kids to be successful in a digital world - one that shifts the focus away from what kids shouldn't do and instead encourages them to use technology proactively and productively.
-
Digital for Good
- Raising Kids to Thrive in an Online World
- Narrateur(s): Adam Verner
- Durée: 5 h et 58 min
- Date de publication: 2021-07-21
- Langue: Anglais
-
Digital for Good offers a refreshingly positive framework for preparing kids to be successful in a digital world - one that shifts the focus away from what kids shouldn't do and instead encourages them to use technology proactively and productively....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Battle for Your Computer
- Israel and the Growth of the Global Cyber-Security Industry
- Auteur(s): Alon Arvatz
- Narrateur(s): Mitch Crawford
- Durée: 12 h et 32 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry, Israeli Defense Force (IDF) cyberwarfare veteran and tech product leader Alon Arvatz examines the "why" and the "how" of the extraordinarily strong connection between Israel's elite cyber military unit and that country's booming offensive and defensive cybersecurity industry. In the book, you'll explore the central role played by Israel in the global fight for cybersecurity supremacy.
-
The Battle for Your Computer
- Israel and the Growth of the Global Cyber-Security Industry
- Narrateur(s): Mitch Crawford
- Durée: 12 h et 32 min
- Date de publication: 2023-10-17
- Langue: Anglais
-
Israeli Defense Force (IDF) cyberwarfare veteran and tech product leader Alon Arvatz examines the "why" and the "how" of the extraordinarily strong connection between Israel's elite cyber military unit and that country's booming offensive and defensive cybersecurity industry....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Auteur(s): Jeffrey Caruso
- Narrateur(s): Mike Lenz
- Durée: 4 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Narrateur(s): Mike Lenz
- Durée: 4 h et 41 min
- Date de publication: 2025-04-29
- Langue: Anglais
-
Cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,02 $ ou gratuit avec l'essai de 30 jours
-
-
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Auteur(s): Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website.
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,47 $ ou gratuit avec l'essai de 30 jours
-