Computer Security
-
-
Computer Science 2.0 Beginners Crash Course
- Python, Javascript, Cyber Security, and Algorithms
- Auteur(s): Ian Batantu
- Narrateur(s): Brynn Fleming
- Durée: 3 h et 18 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The first time I used a computer, it intrigued me to know how these interfaces work. In this audiobook, you’ll learn the same way I did.
-
Computer Science 2.0 Beginners Crash Course
- Python, Javascript, Cyber Security, and Algorithms
- Narrateur(s): Brynn Fleming
- Durée: 3 h et 18 min
- Date de publication: 2023-02-07
- Langue: Anglais
-
The first time I used a computer, it intrigued me to know how these interfaces work. In this audiobook, you’ll learn the same way I did....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Superintelligence on the Horizon
- Steering the Course of Cybersecurity
- Auteur(s): Felipe Chavarro Polanía
- Narrateur(s): Robert Simons
- Durée: 3 h et 31 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As we stand at the precipice of an era marked by unprecedented technological advancement, the emergence of superintelligent AI systems heralds both transformative opportunities and profound risks for the future of humanity. In Superintelligence on the Horizon: Navigating the Future of AI Governance and Cybersecurity, Felipe Chavarro Polanía offers a comprehensive and thought-provoking exploration of the complex challenges and possibilities that lie ahead.
-
Superintelligence on the Horizon
- Steering the Course of Cybersecurity
- Narrateur(s): Robert Simons
- Durée: 3 h et 31 min
- Date de publication: 2025-03-14
- Langue: Anglais
-
In Superintelligence on the Horizon: Navigating the Future of AI Governance and Cybersecurity, Felipe Chavarro Polanía offers a comprehensive and thought-provoking exploration of the complex challenges and possibilities that lie ahead.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Warriors
- Developing the Future of Cyber Professionals
- Auteur(s): Dr. Ray Malmassari
- Narrateur(s): Josh Adams
- Durée: 2 h et 9 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyber Warriors: Developing the Future of Cyber Professionals is a compelling and practical guide designed to inspire and empower the next generation of cybersecurity leaders. Drawing from over 15 years of professional experience and research, Dr. Malmassari provides invaluable insights into the evolving cybersecurity landscape. This book explores critical themes such as leadership support, fostering a strong security culture, continuous learning, and the strategies needed to succeed in an increasingly digital world.
-
Cyber Warriors
- Developing the Future of Cyber Professionals
- Narrateur(s): Josh Adams
- Durée: 2 h et 9 min
- Date de publication: 2025-03-10
- Langue: Anglais
-
Cyber Warriors: Developing the Future of Cyber Professionals is a compelling and practical guide designed to inspire and empower the next generation of cybersecurity leaders.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
America the Vulnerable
- Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
- Auteur(s): Joel Brenner
- Narrateur(s): Lloyd James
- Durée: 9 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Now available in a new edition entitled GLASS HOUSES: Privacy, Secrecy, and Cyber Insecurity in a Transparent World. A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that...
-
America the Vulnerable
- Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
- Narrateur(s): Lloyd James
- Durée: 9 h et 55 min
- Date de publication: 2011-10-05
- Langue: Anglais
- Now available in a new edition entitled GLASS HOUSES: Privacy, Secrecy, and Cyber Insecurity in a Transparent World. A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking ISIS
- How to Destroy the Cyber Jihad
- Auteur(s): Malcolm Nance, Christopher Sampson
- Narrateur(s): Neil Shah
- Durée: 7 h et 47 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This book is written by two of the leading terrorist experts in the world. Hacking ISIS will explain in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world. More, the book will map out the cyberspace-level tactics on how ISIS spreads its terrifying content, how it distributes tens of thousands of pieces of propaganda daily and is winning the battle in cyberspace and how to stop it in its tracks.
-
Hacking ISIS
- How to Destroy the Cyber Jihad
- Narrateur(s): Neil Shah
- Durée: 7 h et 47 min
- Date de publication: 2018-07-09
- Langue: Anglais
-
Hacking ISIS will explain in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital Resilience
- Is Your Company Ready for the Next Cyber Threat?
- Auteur(s): Ray A. Rothrock, Richard A. Clarke - foreword
- Narrateur(s): Chris Sorensen
- Durée: 7 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Fascinating and highly listenable, Digital Resilience opens with the infamous 2013 Target attack, which compromised the credit card information of 40 million customers. In hindsight, the hack (like most today) was preventable. Data theft. Downed servers. Malware. Even human error can trigger cyber events anytime from anywhere around the globe. This powerful guide provides the resilience-building strategies you need to prevail - no matter what strikes.
-
Digital Resilience
- Is Your Company Ready for the Next Cyber Threat?
- Narrateur(s): Chris Sorensen
- Durée: 7 h et 41 min
- Date de publication: 2018-04-05
- Langue: Anglais
-
Fascinating and highly listenable, Digital Resilience opens with the infamous 2013 Target attack, which compromised the credit card information of 40 million customers....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Mastering Online CTFs
- Your Guide to Becoming a Competitor
- Auteur(s): Charles Montago
- Narrateur(s): Matthew Michael Lewis
- Durée: 2 h et 19 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Imagine yourself on a digital battlefield, armed only with your wits and a keyboard. The thrill of outsmarting hackers and navigating complex cybersecurity challenges fuels your adrenaline, pushing you to new heights of knowledge and skill. As you delve deeper into the world of cybersecurity, you’ll discover the immense potential for growth and mastery that awaits you. With each challenge you conquer, you unlock a new level of expertise, honing your abilities to become a formidable force in the digital realm.
-
Mastering Online CTFs
- Your Guide to Becoming a Competitor
- Narrateur(s): Matthew Michael Lewis
- Durée: 2 h et 19 min
- Date de publication: 2024-09-16
- Langue: Anglais
-
Imagine yourself on a digital battlefield, armed only with your wits and a keyboard. The thrill of outsmarting hackers and navigating complex cybersecurity challenges fuels your adrenaline, pushing you to new heights of knowledge and skill.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Auteur(s): Department of Justice FBI NSA Department of State
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Date de publication: 2023-06-21
- Langue: Anglais
-
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Power to the People
- How Open Technological Innovation is Arming Tomorrow's Terrorists
- Auteur(s): Audrey Kurth Cronin
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As Audrey Kurth Cronin explains in Power to the People, what we are seeing now is an exacerbation of an age-old trend. Over the centuries, the most surprising developments in warfare have occurred because of advances in technologies combined with changes in who can use them. Indeed, accessible innovations in destructive force have long driven new patterns of political violence. When Nobel invented dynamite and Kalashnikov designed the AK-47, each inadvertently spurred terrorist and insurgent movements that killed millions and upended the international system.
-
Power to the People
- How Open Technological Innovation is Arming Tomorrow's Terrorists
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 40 min
- Date de publication: 2020-03-10
- Langue: Anglais
-
Never have so many possessed the means to be so lethal. The diffusion of modern technology to ordinary people has given them access to weapons of mass violence previously monopolized by the state....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Black Scorpion Pilot
- A Ford Stevens Military-Aviation Thriller, Volume 2
- Auteur(s): Lawrence A. Colby
- Narrateur(s): Christopher Raab
- Durée: 9 h et 19 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In a hidden base in China, Lieutenant General He Chen licks his wounds. The Devil Dragon project lies in ruins, thanks to the heroics of US Air Force Reserve Captain Ford Stevens and Stevens's best friend, pilot Wu Lee. But now Lee is gone, and as Stevens mourns the loss of his friend, Chen works to complete his second spy plane, codenamed Black Scorpion.
-
The Black Scorpion Pilot
- A Ford Stevens Military-Aviation Thriller, Volume 2
- Narrateur(s): Christopher Raab
- Série: Ford Stevens Military-Aviation Thrillers, Livre 2
- Durée: 9 h et 19 min
- Date de publication: 2019-05-29
- Langue: Anglais
-
In a hidden base in China, Lieutenant General He Chen licks his wounds. The Devil Dragon project lies in ruins, thanks to the heroics of US Air Force Reserve Captain Ford Stevens and Stevens's best friend, pilot Wu Lee....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- Auteur(s): Josephine Wolff
- Narrateur(s): Kate Reading
- Durée: 14 h
- Version intégrale
-
Au global2
-
Performance1
-
Histoire1
Cybersecurity incidents make the news with startling regularity. Each breach makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- Narrateur(s): Kate Reading
- Durée: 14 h
- Date de publication: 2018-11-13
- Langue: Anglais
-
Cybersecurity incidents make the news with startling regularity. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,13 $ ou gratuit avec l'essai de 30 jours
-
-
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Auteur(s): Cybersecurity Bookstore
- Narrateur(s): Will Davidson
- Durée: 2 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security. The book is divided into eight chapters that cover various aspects of IT security and provide practical guidance on how to secure your organization's data and systems.
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Narrateur(s): Will Davidson
- Durée: 2 h
- Date de publication: 2023-10-24
- Langue: Anglais
-
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Classroom-To-Go Training Course 1
- Managing Users, Computers, and Groups [Windows Server 2003 Edition]
- Auteur(s): William Stanek
- Narrateur(s): Ron Knowles
- Durée: 1 h et 51 min
- Version abrégée
-
Au global0
-
Performance0
-
Histoire0
Written by the premier author in Windows administration, William Stanek, and addressing the needs of Windows 2003 administrators and support staff, Classroom-To-Go Training Course for Managing Users, Computers, and Groups is designed to help you build your knowledge of Windows Server 2003.
-
Classroom-To-Go Training Course 1
- Managing Users, Computers, and Groups [Windows Server 2003 Edition]
- Narrateur(s): Ron Knowles
- Durée: 1 h et 51 min
- Date de publication: 2006-11-02
- Langue: Anglais
- Classroom-To-Go Training Course for Managing and Maintaining a Server Environment is designed to help you build your knowledge of Windows Server 2003....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital Downfall
- Technology, Cyberattacks and the End of the American Republic
- Auteur(s): Hugh Taylor
- Narrateur(s): Robbie Smith
- Durée: 6 h et 45 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Is America on the brink of civil war? Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict? What would happen if the lights went out and the technology we rely upon to run American life is no longer available? The present dangers are real. The US is more vulnerable to destructive foreign interference today than it has been in over a century. As Russia and China realize they can’t win shooting wars against the US, they have devised new and cunning ways to destabilize American politics and cripple the US economy.
-
Digital Downfall
- Technology, Cyberattacks and the End of the American Republic
- Narrateur(s): Robbie Smith
- Durée: 6 h et 45 min
- Date de publication: 2020-08-20
- Langue: Anglais
-
Is America on the brink of civil war? Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict? What would happen if the lights went out and the technology we rely upon to run American life is no longer available? The present dangers are real....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Google Archipelago: The Digital Gulag and the Simulation of Freedom
- Auteur(s): Michael Rectenwald
- Narrateur(s): William Williams
- Durée: 4 h et 56 min
- Version intégrale
-
Au global3
-
Performance1
-
Histoire1
Google Archipelago: The Digital Gulag and the Simulation of Freedom explores the reach, penetration, power, and impact of Big Digital or the mega-information managers, social media platforms, Artificial Intelligence developers, providers of other web applications and functionalities, and the architects and proponents of the promised Internet of Things.
-
Google Archipelago: The Digital Gulag and the Simulation of Freedom
- Narrateur(s): William Williams
- Durée: 4 h et 56 min
- Date de publication: 2019-11-21
- Langue: Anglais
-
Google Archipelago: The Digital Gulag and the Simulation of Freedom explores the reach, penetration, power, and impact of Big Digital or the mega-information managers, social media platforms, Artificial Intelligence developers, providers of other web applications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- Auteur(s): Anthony Hack
- Narrateur(s): Jordan Gunner
- Durée: 3 h et 18 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook...Hacking is a very complicated series of processes that take a lot of effort and there are many things that you will need to learn. Hopefully, this audiobook will give you the most basic information so that you will be able to do this properly.
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- Narrateur(s): Jordan Gunner
- Durée: 3 h et 18 min
- Date de publication: 2020-02-07
- Langue: Anglais
-
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Secret Empire
- Eisenhower, CIA, and the Hidden Story of America's Space Espionage
- Auteur(s): Philip Taubman
- Narrateur(s): Michael Prichard
- Durée: 15 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
During the early and most dangerous years of the cold war, a handful of Americans, led by President Dwight D. Eisenhower, revolutionized spying and warfare. In great secrecy and beyond the prying eyes of Congress and the press, they built exotic new machines that opened up the Soviet Union to surveillance and protected the United States from surprise nuclear attack. Secret Empire is the dramatic story of these men and their inventions, told in full for the first time.
-
Secret Empire
- Eisenhower, CIA, and the Hidden Story of America's Space Espionage
- Narrateur(s): Michael Prichard
- Durée: 15 h et 40 min
- Date de publication: 2004-02-26
- Langue: Anglais
- During the early and most dangerous years of the cold war, a handful of Americans, led by President Dwight D. Eisenhower, revolutionized spying and warfare....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,05 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Auteur(s): Hans Weber
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how can you safeguard yourself from the different threats? Let’s find out. We will also take a look at the career of a computer networking specialist and the challenges you can expect.
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Date de publication: 2020-06-12
- Langue: Anglais
-
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how to safeguard yourself from the different threats? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Date de publication: 2021-01-14
- Langue: Anglais
-
The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking
- A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing
- Auteur(s): John Slavio
- Narrateur(s): T. W. Ashworth
- Durée: 1 h et 19 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
All you wanted to know about hacking and computer security. This book will teach you everything you need to know about hacking, the history of hacking, the types of hacking, and security measures that you should undertake. This book will teach you about the techniques you can use to prank your friends or spy on your significant other (maybe). It can also get you started on your journey towards being an ethical hacker, which is a fast-growing, in-demand field.
-
Hacking
- A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing
- Narrateur(s): T. W. Ashworth
- Durée: 1 h et 19 min
- Date de publication: 2017-05-11
- Langue: Anglais
- All you wanted to know about hacking and computer security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-