Computer Security
-
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- Auteur(s): Taimur Ijlal
- Narrateur(s): Scott Mandeville
- Durée: 4 h et 57 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Dive into the dynamic world of cybersecurity with the 'CompTIA Security+ Revision Guide'. This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals. Learn about the unique risks in the digital realm, develop a robust security framework, and understand the intricacies of cybersecurity in various systems. This book is crafted for easy comprehension, requiring no prior expertise in cybersecurity or programming.
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- Narrateur(s): Scott Mandeville
- Durée: 4 h et 57 min
- Date de publication: 2024-02-28
- Langue: Anglais
-
This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Date de publication: 2024-03-06
- Langue: Anglais
-
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- Auteur(s): Learn Computer Hacking in Deep
- Narrateur(s): Jowanna Lewis
- Durée: 3 h et 23 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization. Unless and until you are unaware of the basics, you will not be able to use this software. In fact, for carrying out an effective form of ethical hacking, you will need to learn about the various attacks along with the forms of networks. You can easily find the information in this audiobook.
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- Narrateur(s): Jowanna Lewis
- Durée: 3 h et 23 min
- Date de publication: 2020-02-11
- Langue: Anglais
-
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Auteur(s): Heidi Boghosian
- Narrateur(s): Charles Hubble
- Durée: 7 h et 27 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities. Attorney and data privacy expert Heidi Boghosian unpacks widespread myths around the seemingly innocuous nature of surveillance, sets the record straight about what government agencies and corporations do with our personal data, and offers solutions to take back our information.
-
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Narrateur(s): Charles Hubble
- Série: Myths Made in America
- Durée: 7 h et 27 min
- Date de publication: 2021-07-13
- Langue: Anglais
-
An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- Auteur(s): Keith Martin
- Narrateur(s): Matthew Waterson
- Durée: 7 h et 45 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies - in short, everything we do online.
-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- Narrateur(s): Matthew Waterson
- Durée: 7 h et 45 min
- Date de publication: 2020-05-19
- Langue: Anglais
-
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: A Beginners Guide to Your First Computer Hack
- Learn to Crack a Wireless Network, Basic Security Penetration Made Easy and Step-by-Step Kali Linux
- Auteur(s): Kevin White
- Narrateur(s): Matt Montanez
- Durée: 31 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Hacking will demand your full dedication and interest and also a desire and a craving for knowledge and constant advancement. If your goal is to be a hacker, this is the audiobook to start with! This audiobook contains proven steps and strategies on how to hack a wireless network, carry out a penetration test, and so much more. It gives an insight to the most used hacking techniques and how to develop your basic skills.
-
Hacking: A Beginners Guide to Your First Computer Hack
- Learn to Crack a Wireless Network, Basic Security Penetration Made Easy and Step-by-Step Kali Linux
- Narrateur(s): Matt Montanez
- Durée: 31 min
- Date de publication: 2018-02-26
- Langue: Anglais
-
This audiobook contains proven steps and strategies on how to hack a wireless network, carry out a penetration test, and so much more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Auteur(s): Norman Laurence
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Date de publication: 2020-10-21
- Langue: Anglais
-
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Auteur(s): Jeffrey Caruso
- Narrateur(s): Mike Lenz
- Durée: 4 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Narrateur(s): Mike Lenz
- Durée: 4 h et 41 min
- Date de publication: 2025-04-29
- Langue: Anglais
-
Cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,02 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Privacy Fallacy
- Harm and Power in the Information Economy
- Auteur(s): Ignacio Cofone
- Narrateur(s): Alex Freeman
- Durée: 9 h et 39 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Our data is besieged daily in the information economy, leading to hidden AI harms. Companies can do this because our laws are built on outdated ideas that trap lawmakers, regulators, and courts into wrong assumptions, resulting in ineffective approaches to one of the most pressing concerns of our generation. Drawing on behavioral science, social data science, and economics, this book dispels enduring misconceptions about AI-driven interactions. Its exploration offers a view of why current regulations fail to protect us against digital harms, particularly those created by AI.
-
The Privacy Fallacy
- Harm and Power in the Information Economy
- Narrateur(s): Alex Freeman
- Durée: 9 h et 39 min
- Date de publication: 2024-10-02
- Langue: Anglais
-
Our data is besieged daily in the information economy, leading to hidden AI harms.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Auteur(s): L.D. Knowings
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
You're not a tech wizard, and you don't need to be. This book speaks directly to you the concerned netizen, the proactive parent, the small business owner, or the budding entrepreneur. It's designed to break down the complexities of cybersecurity into something you can understand and apply.
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Date de publication: 2024-06-05
- Langue: Anglais
-
Worried about hackers? Fight back with confidence! Discover straightforward steps to safeguard your online presence perfect for non-techies and pros alike.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Mastering OSINT and Dark Web Investigations
- Techniques for the Modern Investigator
- Auteur(s): Eric Waldrep
- Narrateur(s): Dave LaCosse
- Durée: 5 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Mastering OSINT and Dark Web Investigations: by Eric Waldrep is an advanced guide for professionals navigating the complex worlds of Open Source Intelligence (OSINT) and the Dark Web. The book equips investigators with technical skills, methodologies, and ethical frameworks to handle cases ranging from corporate fraud to national security threats.
-
Mastering OSINT and Dark Web Investigations
- Techniques for the Modern Investigator
- Narrateur(s): Dave LaCosse
- Durée: 5 h et 6 min
- Date de publication: 2025-03-03
- Langue: Anglais
-
Mastering OSINT and Dark Web Investigations: by Eric Waldrep is an advanced guide for professionals navigating the complex worlds of Open Source Intelligence (OSINT) and the Dark Web.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Language of Deception
- Weaponizing Next Generation AI
- Auteur(s): Justin Hutchens
- Narrateur(s): Mike Chamberlain
- Durée: 10 h et 38 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes. In the book, you will explore the history of social engineering and social robotics, the psychology of deception, considerations of machine sentience and consciousness, and the history of how technology has been weaponized in the past.
-
The Language of Deception
- Weaponizing Next Generation AI
- Narrateur(s): Mike Chamberlain
- Durée: 10 h et 38 min
- Date de publication: 2024-02-20
- Langue: Anglais
-
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
No Safe Harbor
- The Inside Truth About Cybercrime - and How to Protect Your Business
- Auteur(s): Mark Sangster
- Narrateur(s): Kevin Stillwell
- Durée: 5 h et 27 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster tells listeners that cybersecurity is not an IT problem to solve - it is a business risk to manage.
-
No Safe Harbor
- The Inside Truth About Cybercrime - and How to Protect Your Business
- Narrateur(s): Kevin Stillwell
- Durée: 5 h et 27 min
- Date de publication: 2020-12-11
- Langue: Anglais
-
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
LikeWar
- The Weaponization of Social Media
- Auteur(s): P. W. Singer, Emerson T. Brooking
- Narrateur(s): George Guidall
- Durée: 11 h et 21 min
- Version intégrale
-
Au global17
-
Performance13
-
Histoire13
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the Internet is changing war and politics, just as war and politics are changing the Internet. Terrorists livestream their attacks, “Twitter wars” produce real world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones.
-
-
Great read
- Écrit par P. M. le 2019-12-13
-
LikeWar
- The Weaponization of Social Media
- Narrateur(s): George Guidall
- Durée: 11 h et 21 min
- Date de publication: 2018-10-02
- Langue: Anglais
-
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the Internet is changing war and politics, just as war and politics are changing the Internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
28,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
There's No Such Thing as Crypto Crime
- An Investigative Handbook
- Auteur(s): Nick Furneaux
- Narrateur(s): Mitch Crawford
- Durée: 20 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains. The book explores the criminal opportunities available to malicious actors in the crypto universe, as well as the investigative principles common to this realm.
-
There's No Such Thing as Crypto Crime
- An Investigative Handbook
- Narrateur(s): Mitch Crawford
- Durée: 20 h et 29 min
- Date de publication: 2024-12-31
- Langue: Anglais
-
Accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- Auteur(s): Phil Champagne
- Narrateur(s): Stephanie Murphy
- Durée: 7 h et 27 min
- Version intégrale
-
Au global12
-
Performance10
-
Histoire10
The Book of Satoshi, the collected writings of Satoshi Nakamoto, creator of the bitcoin. The foreword was written by Jeff Berwick.
-
-
Any writer would be ashamed
- Écrit par Mishipeshu le 2021-08-25
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- Narrateur(s): Stephanie Murphy
- Durée: 7 h et 27 min
- Date de publication: 2015-04-20
- Langue: Anglais
- The book of Satoshi, the collected writings of Satoshi Nakamoto....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Auteur(s): Anthony Hack
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you. This audiobook includes: SQL Computer Programming for Beginners, Python for Beginners, Kali Linux and Hacking with Kali Linux.
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Date de publication: 2020-09-18
- Langue: Anglais
-
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Auteur(s): Jennifer Bleam
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
What value does managed security bring when there’s no way to promise ROI? How do you convince small business owners to part with their hard-earned revenue when they don’t feel vulnerable to a cyberattack? What is the best way to mitigate your clients’ risk without feeling dishonest or using slimy sales tactics? And could someone please demystify sales and make it easy? This book is the answer to all those questions and more. Forged in the steel of real-world MSP successes and failures, you’ll learn how to sell cybersecurity, simply and easily—even for the techiest tech in the industry.
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Date de publication: 2023-09-18
- Langue: Anglais
-
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Auteur(s): Roger A. Grimes
- Narrateur(s): Mike Lenz
- Durée: 13 h et 30 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Narrateur(s): Mike Lenz
- Durée: 13 h et 30 min
- Date de publication: 2025-07-01
- Langue: Anglais
-
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Auteur(s): Jack Jones
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
What do you know about hacking a computer system? If you are like most of us, you can't even get into your own computer if you've forgotten the password. The good news is that hacking is actually a lot easier than you think, and anyone can learn how to do it. As long as you are willing to do the work and to work through the steps patiently, you will also be able to hack the systems that you want to.
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Date de publication: 2017-09-25
- Langue: Anglais
- If you are like most of us, you can't even get into your own computer if you've forgotten the password....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-