Computer Security
-
-
Blockchain: Specific Code, Technology, Bitcoin Tips, and Cryptocurrencies
- Auteur(s): Sylvia Anderson
- Narrateur(s): James Mingesbruney
- Durée: 3 h et 31 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
You may or may not be technologically inclined, but whichever way it floats your boat, this guide will show you what you can learn about blockchain technology. Some of the specific details that nobody tells you will come to light, as well as the opportunities this technology has created for, oh… I don’t know… bitcoin millionaires! Yes, we’ll talk about that too, and we will also mention how blockchain technology fits into that.
-
Blockchain: Specific Code, Technology, Bitcoin Tips, and Cryptocurrencies
- Narrateur(s): James Mingesbruney
- Durée: 3 h et 31 min
- Date de publication: 2019-12-23
- Langue: Anglais
-
You may or may not be technologically inclined, but whichever way it floats your boat, this guide will show you what you can learn about blockchain technology....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
- Auteur(s): Attila Kovacs
- Narrateur(s): J. Matyas
- Durée: 3 h et 4 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Do you want to learn how to build a pen test lab, but you don’t know where to start? Do you want a practical book that explains step by step how to get going? Do you want to become an ethical hacker or pen tester? If the answer is yes to the above questions, this audiobook is for you. Buy this audiobook now, and get started today!
-
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
- Narrateur(s): J. Matyas
- Durée: 3 h et 4 min
- Date de publication: 2019-09-04
- Langue: Anglais
-
Do you want to learn how to build a pen test lab, but you don’t know where to start? Do you want a practical book that explains step by step how to get going? Do you want to become an ethical hacker or pen tester? If the answer is yes to the above questions, this audiobook is for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,62 $ ou gratuit avec l'essai de 30 jours
-
-
-
Il lato oscuro dei social media
- Nuovi scenari di rischio, nuovi predatori, nuove strategie di tutela
- Auteur(s): Roberta Bruzzone, Emanuele Florindi
- Narrateur(s): Roberta Bruzzone
- Durée: 3 h et 41 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
"Oggi di fatto il 42% dell'intera popolazione mondiale è online. E non sono tutte brave persone. La cronaca nera sempre più spesso ci racconta vicende che mostrano con quanta rapidità e facilità ciò che avviene sui social media può trasformarsi in una vera e propria scena del crimine. Quale protezione è possibile contro chi usa questo genere di sistemi contro di noi? Quali sono i principali rischi che si possono correre? E come possiamo difenderci e difendere le persone che ci stanno a cuore?
-
Il lato oscuro dei social media
- Nuovi scenari di rischio, nuovi predatori, nuove strategie di tutela
- Narrateur(s): Roberta Bruzzone
- Durée: 3 h et 41 min
- Date de publication: 2018-11-03
- Langue: Italien
-
"Oggi di fatto il 42% dell'intera popolazione mondiale è online. E non sono tutte brave persone. La cronaca nera sempre più spesso ci...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
7,01 $ ou gratuit avec l'essai de 30 jours
-
-
-
Blockchain: Two Books
- The Complete Edition on the Blockchain Basics, Technology and Its Application in Cryptocurrency and Other Industries That Are Happening Now
- Auteur(s): Lee Sebastian
- Narrateur(s): John Flemming
- Durée: 3 h et 8 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Need to learn blockchain quickly? This crash course will get you up to speed on the basics quickly. This two-in-one audiobook bundle covers all important aspects of blockchain and its applications, especially in cryptocurrency.
-
Blockchain: Two Books
- The Complete Edition on the Blockchain Basics, Technology and Its Application in Cryptocurrency and Other Industries That Are Happening Now
- Narrateur(s): John Flemming
- Durée: 3 h et 8 min
- Date de publication: 2018-11-05
- Langue: Anglais
-
Need to learn blockchain quickly? This crash course will get you up to speed on the basics quickly. This two-in-one audiobook bundle covers all important aspects of blockchain and its applications, especially in cryptocurrency....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Gentle Introduction to Social Engineering Attack and Prevention
- Auteur(s): Stephen Haunts
- Narrateur(s): Timothy Burke
- Durée: 2 h et 42 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Social engineering is one of the biggest threats to our organizations today. Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems. In this audiobook, we will look at some of the techniques used in social engineering and look at how to guard yourself against them.
-
A Gentle Introduction to Social Engineering Attack and Prevention
- Narrateur(s): Timothy Burke
- Durée: 2 h et 42 min
- Date de publication: 2018-06-13
- Langue: Anglais
-
Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems. In this audiobook, we will look at some of the techniques used in social engineering and how to guard yourself against them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Blockchain: An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Money
- Auteur(s): Herbert Jones
- Narrateur(s): Dryw McArthur
- Durée: 2 h et 36 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Do you want to find out what blockchain is, how it works, and what it can do for you? This audiobook could be the answer you are looking for. This audiobook is the ultimate beginner's guide to understanding blockchain technology, cryptocurrencies, bitcoin, and the future of money. In this guide, we shall be discussing everything there is to know about cryptocurrencies, their impact on the future of money and trade, and most importantly, how you can prepare yourself for the disruptive technology that is the blockchain.
-
Blockchain: An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Money
- Narrateur(s): Dryw McArthur
- Durée: 2 h et 36 min
- Date de publication: 2017-10-30
- Langue: Anglais
- Do you want to find out what blockchain is, how it works, and what it can do for you? This audiobook could be the answer you are looking for....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Pass Your IT Certification the First Time
- Tips and Tricks for Success
- Auteur(s): William A. Cellich
- Narrateur(s): John Edmondson
- Durée: 2 h et 21 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
IT certifications are ways for professionals to show their expertise. Obtaining these important credentials can be time consuming and expensive. William A. Cellich, recognized information security professional and consultant, will show you proven methods to assure success in getting certified.
-
Pass Your IT Certification the First Time
- Tips and Tricks for Success
- Narrateur(s): John Edmondson
- Durée: 2 h et 21 min
- Date de publication: 2015-06-25
- Langue: Anglais
- IT certifications are ways for professionals to show their expertise. William A. Cellich will show you proven methods to assure success in getting certified....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Burners & Black Markets
- How to Be Invisible on Android, Blackberry & iPhone
- Auteur(s): Lance Henderson
- Narrateur(s): James C. Lewis
- Durée: 3 h et 45 min
- Version intégrale
-
Au global5 out of 5 stars 1
-
Performance5 out of 5 stars 1
-
Histoire5 out of 5 stars 1
The FBI wants to backdoor your smartphone. So does the NSA. They failed with Apple's iPhone but like most bullies, they'll try softer targets - targets that don't fight back. That's why unless you've got the proper tools to ward them off, they'll return. Be ready for them. Buy this book and master anonymity and give the NSA a burn notice they'll never forget. A lot of books say install this, avoid that, but here you'll find easy steps to starve the beast.
-
Burners & Black Markets
- How to Be Invisible on Android, Blackberry & iPhone
- Narrateur(s): James C. Lewis
- Durée: 3 h et 45 min
- Date de publication: 2016-06-17
- Langue: Anglais
- The FBI wants to backdoor your smartphone. So does the NSA. They failed with Apple's iPhone but like most bullies, they'll try softer targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cryptography & Quality Assurance
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 2 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Two books in one! Is cryptography what you want to learn? Always wondered about its history, from traditional to modern cryptography? Does it interest you how cryptosystems work? Purchase Cryptography to discover everything you want to know about it! Is quality assurance what you want to learn? Always wondered how one becomes a better software developer? Does how to achieve this quickly interest you? Purchase Quality Assurance to discover everything you need to know about testing and software quality!
-
Cryptography & Quality Assurance
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 2 min
- Date de publication: 2016-03-07
- Langue: Anglais
- Is cryptography what you want to learn? Always wondered about its history, from traditional to modern cryptography? Is quality assurance what you want to learn? This book can help....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Darknet
- A Beginner's Guide to Staying Anonymous Online
- Auteur(s): Lance Henderson
- Narrateur(s): John T. Parker
- Durée: 2 h et 9 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Want to surf the web anonymously? This audiobook is the perfect guide for anyone who wants to cloak their online activities. Whether you're on Usenet, Facebook, P2P, or browsing the web with standard browsers like Opera, Firefox, and Internet Explorer, I will show you how to become a ghost on the internet, leaving no tracks back to your isp, or anyone else.
-
Darknet
- A Beginner's Guide to Staying Anonymous Online
- Narrateur(s): John T. Parker
- Durée: 2 h et 9 min
- Date de publication: 2014-09-10
- Langue: Anglais
- Want to surf the web anonymously? This audiobook is the perfect guide for anyone who wants to cloak their online activities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
NIST Cybersecurity & Privacy Program
- Auteur(s): National Institute of Standards and Technology (NIST)
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public. Our work ranges from specific information that can be put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.
-
NIST Cybersecurity & Privacy Program
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Date de publication: 2021-07-19
- Langue: Anglais
-
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Program Best Practices
- Auteur(s): United States Department of Labor
- Narrateur(s): Tom Brooks
- Durée: 1 h et 13 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
ERISA-covered plans often hold millions of dollars or more in assets and maintain personal data on participants, which can make them tempting targets for cyber-criminals. Responsible plan fiduciaries have an obligation to ensure proper mitigation of cybersecurity risks.
-
Cybersecurity Program Best Practices
- Narrateur(s): Tom Brooks
- Durée: 1 h et 13 min
- Date de publication: 2021-07-13
- Langue: Anglais
-
ERISA-covered plans often hold millions of dollars or more in assets and maintain personal data on participants, which can make them tempting targets for cyber-criminals. Responsible plan fiduciaries have an obligation to ensure proper mitigation of cybersecurity risks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity and Defense in 2021
- Using Awareness, Cyber Defense and Best Practices to Protect Yourself Against Cyberwarfare and Attackers
- Auteur(s): Michael Goedeker MSc.
- Narrateur(s): Mandy Grant-Grierson
- Durée: 3 h et 15 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
When an attack happens, you don't want to be the person or team in complete panic. In an episode, terror becomes the worst enemy and can lead to mistakes. When we panic, we miss important clues about the attack, campaign, or attacker. Having a basic knowledge of general (cyber)security terms and concepts helps us respond faster and more professionally than most teams without that training or expertise. This book focuses on essential concepts in the least amount of time and pages to give you the basic knowledge to stay focused.
-
Cybersecurity and Defense in 2021
- Using Awareness, Cyber Defense and Best Practices to Protect Yourself Against Cyberwarfare and Attackers
- Narrateur(s): Mandy Grant-Grierson
- Série: Modern Cyber Intelligence, Livre 1
- Durée: 3 h et 15 min
- Date de publication: 2021-12-02
- Langue: Anglais
-
When an attack happens, you don't want to be the person or team in complete panic. Having a basic knowledge of general (cyber)security terms and concepts helps us respond faster and more professionally than most teams without that training or expertise....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,17 $ ou gratuit avec l'essai de 30 jours
-
-
-
GuíaBurros: Ciberseguridad
- Consejos para tener vidas digitales más seguras
- Auteur(s): Mónica Valle
- Narrateur(s): Carla Huélamo
- Durée: 3 h et 3 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Es una guía con consejos para tener vidas digitales más seguras y para conocer las ciberamenazas más comunes y cómo detectarlas.
-
GuíaBurros: Ciberseguridad
- Consejos para tener vidas digitales más seguras
- Narrateur(s): Carla Huélamo
- Durée: 3 h et 3 min
- Date de publication: 2021-11-24
- Langue: Espagnol
-
Es una guía con consejos para tener vidas digitales más seguras y para conocer las ciberamenazas más comunes y cómo detectarlas...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Date de publication: 2022-04-04
- Langue: Anglais
-
This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Getting Started with Cybersecurity Risk Management | Ransomware
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 1 h et 22 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The Framework is organized by five key functions—identify, protect, detect, respond, and recover. These five terms provide a comprehensive way to view the lifecycle for managing cybersecurity risk. The activities listed under each function offer a good starting point for any organization, including those with limited resources to address cybersecurity challenges. They help to set priorities so that an organization gets the greatest value out of its efforts to manage ransomware risks.
-
Getting Started with Cybersecurity Risk Management | Ransomware
- Narrateur(s): Tom Brooks
- Durée: 1 h et 22 min
- Date de publication: 2022-03-30
- Langue: Anglais
-
The Framework is organized by five key functions—identify, protect, detect, respond, and recover. These five terms provide a comprehensive way to view the lifecycle for managing cybersecurity risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Evaluation of the CPSC’s NIST Cybersecurity Framework Implementation
- Auteur(s): U.S. Consumer Product Safety Commission
- Narrateur(s): Tom Brooks
- Durée: 1 h et 23 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
This report evaluates the US Consumer Product Safety Commission’s (CPSC) progress in implementing the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity (CSF). The CSF provides guidelines for organizations to evaluate and improve an agency’s cybersecurity posture. This approach requires management to consider cybersecurity risks as part of the organization’s overall risk management assessment, specifically with a focus on an agency’s cybersecurity risk.
-
Evaluation of the CPSC’s NIST Cybersecurity Framework Implementation
- Narrateur(s): Tom Brooks
- Durée: 1 h et 23 min
- Date de publication: 2022-02-14
- Langue: Anglais
-
This report evaluates the US Consumer Product Safety Commission’s progress in implementing the National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (CSF). The CSF provides guidelines to evaluate an agency’s cybersecurity posture....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Cybersecurity experts agree: No one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls.
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2022-01-14
- Langue: Anglais
-
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Improving Security of Open Source Software in Operational Technology and Industrial Control Systems
- Auteur(s): CISA FBI NSA Department of Treasury
- Narrateur(s): Tom Brooks
- Durée: 2 h et 28 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
This fact sheet will assist with better management of risk from OSS use in OT products and increase resilience using available resources. While several resources and recommendations within this fact sheet are best suited for execution by the vendor or the critical infrastructure owner, collaboration across parties will result in less friction for operator workflows and promote a safer, more reliable system and provision of National Critical Functions.
-
Improving Security of Open Source Software in Operational Technology and Industrial Control Systems
- Narrateur(s): Tom Brooks
- Durée: 2 h et 28 min
- Date de publication: 2023-10-25
- Langue: Anglais
-
This fact sheet will assist with better management of risk from OSS use in OT products and increase resilience using available resources....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Risk Business: Second Edition
- What Leaders Need to Know About Intelligence and Risk Based Security
- Auteur(s): Levi Gundert
- Narrateur(s): Levi Gundert
- Durée: 3 h et 44 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In this book, Levi Gundert, chief security officer at Recorded Future, draws on his decades of experience to develop a comprehensive cybersecurity framework emphasizing risk over threats. The key is for the technical side of any organization to present intelligence to executives and other decision-makers in terms they understand: the language of risk. All operational outcomes must be framed in a clear, concrete way that tells a story of profit, loss, and risk reduction.
-
The Risk Business: Second Edition
- What Leaders Need to Know About Intelligence and Risk Based Security
- Narrateur(s): Levi Gundert
- Durée: 3 h et 44 min
- Date de publication: 2023-08-18
- Langue: Anglais
-
In this book, Levi Gundert, chief security officer at Recorded Future, draws on his decades of experience to develop a comprehensive cybersecurity framework emphasizing risk over threats....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-