Computer Security
-
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Auteur(s): Shashi Shekhar, Pamela Vold
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Billions of people around the globe use various applications of spatial computing daily - by using a ride-sharing app, GPS, social media check-ins, even Pokemon Go. Scientists and researchers use spatial computing to track diseases, map the bottom of the oceans, chart the behavior of endangered species, and create election maps in real time. Drones and driverless cars use a variety of spatial computing technologies. Spatial computing works by understanding the physical world, knowing and communicating our relation to places in that world, and navigating through those places.
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Narrateur(s): Rosemary Benson
- Série: MIT Press Essential Knowledge
- Durée: 5 h et 30 min
- Date de publication: 2020-06-02
- Langue: Anglais
-
Billions of people around the globe use various applications of spatial computing daily-by using a ride-sharing app, GPS, the e911 system, social media check-ins, even Pokemon Go....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity
- What You Need to Know About Cybersecurity, Ethical Hacking, Risk Assessment, Social Engineering & How to Defend Yourself from Attacks
- Auteur(s): Ralph Voss
- Narrateur(s): James Powell
- Durée: 4 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyber Security may sound like something very complex. However, this book takes a simple, easy to understand approach to breakdown complex topics so that you can understand better and take appropriate action to protect your information once you finish listening.
-
Cybersecurity
- What You Need to Know About Cybersecurity, Ethical Hacking, Risk Assessment, Social Engineering & How to Defend Yourself from Attacks
- Narrateur(s): James Powell
- Durée: 4 h et 12 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
Cyber Security may sound like something very complex. However, this book takes a simple, easy to understand approach to breakdown complex topics so that you can understand better and take appropriate action to protect your information once you finish listening....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- Auteur(s): Kip Boyle
- Narrateur(s): Kip A. Boyle
- Durée: 5 h et 14 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- Narrateur(s): Kip A. Boyle
- Durée: 5 h et 14 min
- Date de publication: 2019-09-14
- Langue: Anglais
-
With this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Facing Cyber Threats Head On
- Protecting Yourself and Your Business
- Auteur(s): Brian Minick
- Narrateur(s): Patrick Lawlor
- Durée: 5 h et 9 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
News breaks all the time that hackers have attacked another company. Media outlets regularly cover cyber events. The President issues executive orders, and Congress explores cyber legislation. With all these events happening, business leaders must ask: what does this mean for my business and me?
-
Facing Cyber Threats Head On
- Protecting Yourself and Your Business
- Narrateur(s): Patrick Lawlor
- Durée: 5 h et 9 min
- Date de publication: 2017-01-16
- Langue: Anglais
- News breaks all the time that hackers have attacked another company....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Sekyurithitantoushanotamenojouhousekyurithitaisaku zissengaido2025nenbann
- Saizennsennnomamorinogennsoku Zyouhousekyurithitaisakuzissenngaido
- Auteur(s): Ito Kazuya
- Narrateur(s): Coefont Toyama Haru
- Durée: 2 h et 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
高度化するサイバー攻撃の現状に対応するためにセキュリティ担当者には基本の徹底と最先端の知識が不可欠です本書では課題から解決策まで実践的な視点で徹底解説します
-
Sekyurithitantoushanotamenojouhousekyurithitaisaku zissengaido2025nenbann
- Saizennsennnomamorinogennsoku Zyouhousekyurithitaisakuzissenngaido
- Narrateur(s): Coefont Toyama Haru
- Durée: 2 h et 53 min
- Date de publication: 2025-09-11
- Langue: Japonais
-
高度化するサイバー攻撃の現状に対応するためにセキュリティ担当者には基本の徹底と最先端の知識が不可欠です本書では課題から解決策まで実践的な視点で徹底解説します
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Public Wi-Fi Dangers
- 10 Tips for Safe Browsing
- Auteur(s): Alsden Keir
- Narrateur(s): Mark Tompkins
- Durée: 2 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Public Wi-Fi Dangers: 10 Tips for Safe Browsing is your essential guide to navigating the convenience—and the peril—of open wireless networks in today’s hyper-connected world. In this clear, practical, and eye-opening guide, cybersecurity author Alsden Keir strips away the illusion of safety surrounding public Wi-Fi and arms you with the knowledge to protect yourself. Each chapter focuses on a specific threat—and the corresponding action you can take to neutralize it.
-
Public Wi-Fi Dangers
- 10 Tips for Safe Browsing
- Narrateur(s): Mark Tompkins
- Durée: 2 h
- Date de publication: 2025-08-27
- Langue: Anglais
-
Public Wi-Fi Dangers: 10 Tips for Safe Browsing is your essential guide to navigating the convenience—and the peril—of open wireless networks in today’s hyper-connected world.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Coding Democracy
- How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
- Auteur(s): Maureen Webb, Cory Doctorow - foreword
- Narrateur(s): Wendy Tremont King
- Durée: 16 h et 35 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In Coding Democracy, Maureen Webb offers another view. Hackers, she argues, can be vital disruptors. Hacking is becoming a practice, an ethos, and a metaphor for a new wave of activism in which ordinary citizens are inventing new forms of distributed, decentralized democracy for a digital era. Confronted with concentrations of power, mass surveillance, and authoritarianism enabled by new technology, the hacking movement is trying to "build out" democracy into cyberspace.
-
Coding Democracy
- How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
- Narrateur(s): Wendy Tremont King
- Durée: 16 h et 35 min
- Date de publication: 2021-03-09
- Langue: Anglais
-
Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- Auteur(s): Abraham K White
- Narrateur(s): Dalan E Decker
- Durée: 5 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking.
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- Narrateur(s): Dalan E Decker
- Durée: 5 h et 49 min
- Date de publication: 2018-04-26
- Langue: Anglais
-
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Start-Up Secure
- Baking Cybersecurity into Your Company from Founding to Exit
- Auteur(s): Chris Castaldo
- Narrateur(s): Timothy Andrés Pabon
- Durée: 4 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cybersecurity as a whole can be overwhelming for startup founders. Start-Up Secure breaks down the essentials so you can determine what is right for your start-up and your customers. You'll learn techniques, tools, and strategies that will ensure data security for yourself, your customers, your funders, and your employees. Pick and choose the suggestions that make the most sense for your situation-based on the solid information in this book.
-
Start-Up Secure
- Baking Cybersecurity into Your Company from Founding to Exit
- Narrateur(s): Timothy Andrés Pabon
- Durée: 4 h et 41 min
- Date de publication: 2021-06-08
- Langue: Anglais
-
Cybersecurity as a whole can be overwhelming for startup founders. Start-Up Secure breaks down the essentials so you can determine what is right for your start-up and your customers....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,81 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Beginners
- How to Apply the NIST Risk Management Framework
- Auteur(s): John Knowles
- Narrateur(s): Scott Clem
- Durée: 5 h et 10 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Handling risk is one of the chief goals of organizations, mainly in the InfoSec program. Risk management delivers the vehicle for the balance between compliance and security. Businesses need to defend their data by launching and upholding an operational risk management platform. Organizations must considered their environment, resources, threats, and sensitivity of their data. In this book, you will learn the fundamentals of risk management with security, and how to deploy the RMF to efficiently deal with compliance and risk within your business.
-
Cybersecurity for Beginners
- How to Apply the NIST Risk Management Framework
- Narrateur(s): Scott Clem
- Durée: 5 h et 10 min
- Date de publication: 2020-12-17
- Langue: Anglais
-
Handling risk is one of the chief goals of organizations, mainly in the InfoSec program. Risk management delivers the vehicle for the balance between compliance and security. Businesses need to defend their data by launching and upholding an operational risk management platform....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,06 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Beginners
- How to Manage Risk, Using the NIST Cybersecurity Framework
- Auteur(s): John Knowles
- Narrateur(s): Scott Clem
- Durée: 5 h et 27 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Learn what it takes to manage risk in your organization, specifically risk that has to do with information with information systems, with data, and much more.
-
Cybersecurity for Beginners
- How to Manage Risk, Using the NIST Cybersecurity Framework
- Narrateur(s): Scott Clem
- Durée: 5 h et 27 min
- Date de publication: 2020-12-14
- Langue: Anglais
-
Learn what it takes to manage risk in your organization, specifically risk that has to do with information with information systems, with data, and much more.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hijacked by Hackers
- Be Afraid. Be Very, Very Afraid.
- Auteur(s): Michael Klein
- Narrateur(s): Ken Maxon
- Durée: 4 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks and tools of the trade used to entice or frighten people into following their lead. You'll hear stories of cyber criminals who went legit, creating quite the stir in corporations like Google and Microsoft. You'll also be introduced to hackers who have threatened our national security and compromised global systems to reveal their secrets.
-
Hijacked by Hackers
- Be Afraid. Be Very, Very Afraid.
- Narrateur(s): Ken Maxon
- Durée: 4 h et 6 min
- Date de publication: 2016-10-28
- Langue: Anglais
- Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyberdeterrence and Cyberwar
- Auteur(s): Martin C. Libicki
- Narrateur(s): Erik Sandvold
- Durée: 6 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The protection of cyberspace has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information for money or to disrupt operations. Future wars are likely to be carried out, in part or perhaps entirely, in cyberspace. It might therefore seem obvious that maneuvering in cyberspace is like maneuvering in other media, but nothing would be more misleading. Cyberspace has its own laws.
-
Cyberdeterrence and Cyberwar
- Narrateur(s): Erik Sandvold
- Durée: 6 h et 8 min
- Date de publication: 2010-11-18
- Langue: Anglais
- The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
16,32 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- Auteur(s): Christian Espinosa
- Narrateur(s): Kaleo Griffith
- Durée: 6 h et 54 min
- Version intégrale
-
Au global3
-
Performance2
-
Histoire2
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
wisdom doesn’t go past the title
- Écrit par Douglas Lowney le 2023-01-14
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- Narrateur(s): Kaleo Griffith
- Durée: 6 h et 54 min
- Date de publication: 2021-03-08
- Langue: Anglais
-
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,19 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Keep Kids Safe on the Internet in 2025
- Auteur(s): Deacon John O'Maley
- Narrateur(s): Michael P. Grande
- Durée: 2 h et 35 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In 2025’s hyper-connected world, the internet is both a playground and a battlefield for our children’s well-being. How to Keep Kids Safe on the Internet in 2025 is an invaluable guide that empowers parents and guardians to protect children from online dangers while nurturing healthy digital habits.
-
How to Keep Kids Safe on the Internet in 2025
- Narrateur(s): Michael P. Grande
- Durée: 2 h et 35 min
- Date de publication: 2025-08-21
- Langue: Anglais
-
In 2025’s hyper-connected world, the internet is both a playground and a battlefield for our children’s well-being. How to Keep Kids Safe on the Internet in 2025 is an invaluable guide that empowers parents and guardians to protect children from online dangers while nurturing healthy digital habits.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Security Awareness for Dummies
- Auteur(s): Ira Winkler CISSP
- Narrateur(s): Tristan Morris
- Durée: 9 h et 16 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness for Dummies gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization.
-
Security Awareness for Dummies
- Narrateur(s): Tristan Morris
- Durée: 9 h et 16 min
- Date de publication: 2022-05-24
- Langue: Anglais
-
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
More Awesome Than Money
- Four Boys and Their Heroic Quest to Save Your Privacy from Facebook
- Auteur(s): Jim Dwyer
- Narrateur(s): Pete Larkin
- Durée: 12 h et 22 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Their idea was simple. Four NYU undergrads wanted to build a social network that would allow users to control their personal data instead of surrendering it to big businesses like Facebook. They called it Diaspora. In days they raised $200,000, and reporters, venture capitalists, and the digital community's most legendary figures were soon monitoring their progress. But as the months passed and the money ran out, the Diaspora Four fell victim to errors, bad decisions, and their own hubris.
-
More Awesome Than Money
- Four Boys and Their Heroic Quest to Save Your Privacy from Facebook
- Narrateur(s): Pete Larkin
- Durée: 12 h et 22 min
- Date de publication: 2014-10-16
- Langue: Anglais
- Their idea was simple. Four NYU undergrads wanted to build a social network that would allow users to control their personal data instead of surrendering it to big businesses....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
NIST CSF 2.0
- Your Essential Introduction to Managing Cybersecurity Risks
- Auteur(s): Andrew Pattison
- Narrateur(s): Kerry Hutchinson
- Durée: 2 h et 7 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organize their critical activities and ensure they remain up to date, Version 2.0 states that “The CSF is designed to be used by organizations of all sizes and sectors, including industry, government, academia, and nonprofit organizations, regardless of the maturity level of their cybersecurity programs.”
-
NIST CSF 2.0
- Your Essential Introduction to Managing Cybersecurity Risks
- Narrateur(s): Kerry Hutchinson
- Durée: 2 h et 7 min
- Date de publication: 2025-05-30
- Langue: Anglais
-
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Bundle: 4 Books in One
- The World of Cybersecurity - Cybersecurity for Small Business - Is Cyber Deterrence Possible? - Cybersecurity Career Path
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 4 h et 23 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As the times have shifted in the last decade or so, we have started to depend more and more upon our computers as well as other electronic devices for our needs. The United States’ reliance on networked systems and the high costs associated with cyber attacks have led many leaders in the US government and the Department of Defense (DOD) to prioritize protecting our critical networked infrastructure. Part of that focus is trying to develop a strategy for deterring adversaries from attacking our networks in the first place.
-
Cybersecurity Bundle: 4 Books in One
- The World of Cybersecurity - Cybersecurity for Small Business - Is Cyber Deterrence Possible? - Cybersecurity Career Path
- Narrateur(s): Tom Brooks
- Durée: 4 h et 23 min
- Date de publication: 2021-06-09
- Langue: Anglais
-
As the times have shifted in the last decade or so, we have started to depend more and more upon our computers as well as other electronic devices for our needs. It's only natural for you to worry about your own safety when you know the extent of the dependency upon technology around you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cryptography
- A Very Short Introduction
- Auteur(s): Fred Piper, Sean Murphy
- Narrateur(s): L. J. Ganser
- Durée: 4 h et 26 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce.
-
Cryptography
- A Very Short Introduction
- Narrateur(s): L. J. Ganser
- Durée: 4 h et 26 min
- Date de publication: 2021-06-01
- Langue: Anglais
-
This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,20 $ ou gratuit avec l'essai de 30 jours
-