Computer Security
-
-
Engaging with Artificial Intelligence (AI)
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The purpose of this publication is to provide organisations with guidance on how to use AI systems securely. The audio summarises some important threats related to AI systems and prompts organisations to consider steps they can take to engage with AI while managing risk. It provides mitigations to assist both organisations that use self-hosted and third-party hosted AI systems. The guidance within this publication is focused on using AI systems securely rather than developing secure AI systems.
-
Engaging with Artificial Intelligence (AI)
- Narrateur(s): Tom Brooks
- Durée: 1 h et 6 min
- Date de publication: 2024-02-05
- Langue: Anglais
-
The purpose of this publication is to provide organisations with guidance on how to use AI systems securely. The audio summarises some important threats related to AI systems and prompts organisations to consider steps they can take to engage with AI while managing risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Auteur(s): Ed Adams
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Date de publication: 2024-03-26
- Langue: Anglais
-
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization can contribute to improving its cybersecurity backbone.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Sekyurithitantoushanotamenojouhousekyurithitaisaku zissengaido2025nenbann
- Saizennsennnomamorinogennsoku Zyouhousekyurithitaisakuzissenngaido
- Auteur(s): Ito Kazuya
- Narrateur(s): Coefont Toyama Haru
- Durée: 2 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
高度化するサイバー攻撃の現状に対応するためにセキュリティ担当者には基本の徹底と最先端の知識が不可欠です本書では課題から解決策まで実践的な視点で徹底解説します
-
Sekyurithitantoushanotamenojouhousekyurithitaisaku zissengaido2025nenbann
- Saizennsennnomamorinogennsoku Zyouhousekyurithitaisakuzissenngaido
- Narrateur(s): Coefont Toyama Haru
- Durée: 2 h et 53 min
- Date de publication: 2025-09-11
- Langue: Japonais
-
高度化するサイバー攻撃の現状に対応するためにセキュリティ担当者には基本の徹底と最先端の知識が不可欠です本書では課題から解決策まで実践的な視点で徹底解説します
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
NIST CSF 2.0
- Your Essential Introduction to Managing Cybersecurity Risks
- Auteur(s): Andrew Pattison
- Narrateur(s): Kerry Hutchinson
- Durée: 2 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organize their critical activities and ensure they remain up to date, Version 2.0 states that “The CSF is designed to be used by organizations of all sizes and sectors, including industry, government, academia, and nonprofit organizations, regardless of the maturity level of their cybersecurity programs.”
-
NIST CSF 2.0
- Your Essential Introduction to Managing Cybersecurity Risks
- Narrateur(s): Kerry Hutchinson
- Durée: 2 h et 7 min
- Date de publication: 2025-05-30
- Langue: Anglais
-
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- Auteur(s): Anthony Farrior
- Narrateur(s): Jennifer Workman
- Durée: 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- Narrateur(s): Jennifer Workman
- Durée: 14 min
- Date de publication: 2024-07-01
- Langue: Anglais
-
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts and techniques.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Combatting Cyber Terrorism
- A Guide to Understanding the Cyber Threat Landscape and Incident Response Planning
- Auteur(s): Richard Bingley
- Narrateur(s): Daniel Crespin
- Durée: 6 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook recounts case studies to show the types of threats we face and provides a comprehensive coverage of risk management tactics and strategies to protect yourself against such nefarious threat actors. These include key mitigation and controls for information security or security and HR-related professionals.
-
Combatting Cyber Terrorism
- A Guide to Understanding the Cyber Threat Landscape and Incident Response Planning
- Narrateur(s): Daniel Crespin
- Durée: 6 h et 17 min
- Date de publication: 2024-11-04
- Langue: Anglais
-
Combatting Cyber Terrorism – A guide to understanding the cyber threat landscape and incident response planning, analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Becoming an Ethical Hacker
- Masters at Work
- Auteur(s): Gary Rivlin
- Narrateur(s): Michael David Axtell
- Durée: 3 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
An acclaimed investigative journalist explores ethical hacking and presents a listener-friendly, informative guide to everything there is to know about entering the field of cybersecurity.
-
Becoming an Ethical Hacker
- Masters at Work
- Narrateur(s): Michael David Axtell
- Série: Masters at Work, Livre 8
- Durée: 3 h et 47 min
- Date de publication: 2019-05-07
- Langue: Anglais
-
An acclaimed investigative journalist explores ethical hacking and presents a listener-friendly, informative guide to everything there is to know about entering the field of cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,99 $ ou gratuit avec l'essai de 30 jours
-
-
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Auteur(s): Clint Watts
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns that have become the cutting edge of modern warfare - and how we can protect ourselves against them. Clint Watts electrified the nation when he testified regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind.
-
-
Interesting and engaging
- Écrit par Mark Dynna le 2018-07-18
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Date de publication: 2018-05-29
- Langue: Anglais
-
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare - and how we can protect ourselves and our country against them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,46 $ ou gratuit avec l'essai de 30 jours
-
-
-
Certified Cloud Security Professional (CCSP) Study Guide
- Cloud Security for Everyone
- Auteur(s): Ric Messier
- Narrateur(s): Derek Shoales
- Durée: 14 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you an experienced cloud security professional looking to upskill or take your career to the next level? The demand for cloud security expertise is skyrocketing and earning a Certified Cloud Security Professional (CCSP) certification is one way to demonstrate your knowledge. But preparing for the exam can be daunting. This comprehensive guide, written by industry expert Ric Messier, provides an in-depth look at the CCSP exam and covers the essential topics for today's security and cloud practitioners.
-
Certified Cloud Security Professional (CCSP) Study Guide
- Cloud Security for Everyone
- Narrateur(s): Derek Shoales
- Durée: 14 h
- Date de publication: 2026-04-28
- Langue: Anglais
-
Are you an experienced cloud security professional looking to upskill or take your career to the next level? The demand for cloud security expertise is skyrocketing and earning a Certified Cloud Security Professional (CCSP) certification is one way to demonstrate your knowledge.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Tor E L'Arte Oscura Dell'Anonimato
- Auteur(s): Lance Henderson
- Narrateur(s): Marcellino Vicari
- Durée: 3 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Siete stanchi di essere spiati dal vostro ISP? Dal fisco? Parenti ficcanaso su Facebook? Questo libro è la soluzione È il miglior libro sulla privacy online che il denaro possa comprare, con tutti i suggerimenti, le strategie, le guide e i trucchi segreti sui metadati che nemmeno la NSA sa. Ora è vostro (GRATIS!). Non sono richieste competenze in materia di hacking, test, kali linux o programmazione! Inoltre, lo imparerete in pochi giorni, non in anni, e per una frazione del costo di una laurea.
-
Tor E L'Arte Oscura Dell'Anonimato
- Narrateur(s): Marcellino Vicari
- Durée: 3 h et 42 min
- Date de publication: 2025-09-11
- Langue: Italien
-
Siete stanchi di essere spiati dal vostro ISP? Dal fisco? Parenti ficcanaso su Facebook? Questo libro è la soluzione È il miglior libro sulla privacy online che il denaro possa comprare, con tutti i suggerimenti, le strategie, le guide e i trucchi segreti sui metadati che nemmeno la NSA sa.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,19 $ ou gratuit avec l'essai de 30 jours
-
-
-
Certificate of Cloud Security Knowledge (CCSK v5) Official Study Guide
- In-Depth Guidance and Practice
- Auteur(s): Graham Thompson
- Narrateur(s): David Stifel
- Durée: 12 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
As cloud technology becomes increasingly essential across industries, the need for thorough security knowledge and certification has never been more crucial. The Certificate of Cloud Security Knowledge (CCSK) exam, globally recognized and highly respected, presents a formidable challenge for many. Author Graham Thompson offers you in-depth guidance and practical tools not only to pass the exam but also to grasp the broader implications of cloud security.
-
Certificate of Cloud Security Knowledge (CCSK v5) Official Study Guide
- In-Depth Guidance and Practice
- Narrateur(s): David Stifel
- Durée: 12 h
- Date de publication: 2025-12-02
- Langue: Anglais
-
As cloud technology becomes increasingly essential across industries, the need for thorough security knowledge and certification has never been more crucial. The Certificate of Cloud Security Knowledge (CCSK) exam, globally recognized and highly respected, presents a formidable challenge for many.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Mastering Online CTFs
- Your Guide to Becoming a Competitor
- Auteur(s): Charles Montago
- Narrateur(s): Matthew Michael Lewis
- Durée: 2 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Imagine yourself on a digital battlefield, armed only with your wits and a keyboard. The thrill of outsmarting hackers and navigating complex cybersecurity challenges fuels your adrenaline, pushing you to new heights of knowledge and skill. As you delve deeper into the world of cybersecurity, you’ll discover the immense potential for growth and mastery that awaits you. With each challenge you conquer, you unlock a new level of expertise, honing your abilities to become a formidable force in the digital realm.
-
Mastering Online CTFs
- Your Guide to Becoming a Competitor
- Narrateur(s): Matthew Michael Lewis
- Durée: 2 h et 19 min
- Date de publication: 2024-09-16
- Langue: Anglais
-
Imagine yourself on a digital battlefield, armed only with your wits and a keyboard. The thrill of outsmarting hackers and navigating complex cybersecurity challenges fuels your adrenaline, pushing you to new heights of knowledge and skill.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Transforming Information Security
- Optimizing Five Concurrent Trends to Reduce Resource Drain
- Auteur(s): Kathleen M. Moriarty
- Narrateur(s): Kathleen M. Moriarty
- Durée: 7 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.
-
Transforming Information Security
- Optimizing Five Concurrent Trends to Reduce Resource Drain
- Narrateur(s): Kathleen M. Moriarty
- Durée: 7 h et 23 min
- Date de publication: 2025-06-16
- Langue: Anglais
-
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Smart
- Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
- Auteur(s): Bart R. McDonough
- Narrateur(s): Kyle Tait
- Durée: 10 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret.
-
Cyber Smart
- Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
- Narrateur(s): Kyle Tait
- Durée: 10 h et 34 min
- Date de publication: 2019-02-19
- Langue: Anglais
-
The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Your Safety and Privacy Online: The CIA and NSA
- Auteur(s): Siggi Bjarnason
- Narrateur(s): Becky White
- Durée: 4 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them. My goal is to explain online threats in terms that don't require a technical background to understand. All techno-speak will be limited, and where it cannot be avoided, I will first explain them in common, non-technical terms.
-
Your Safety and Privacy Online: The CIA and NSA
- Narrateur(s): Becky White
- Durée: 4 h et 27 min
- Date de publication: 2019-11-22
- Langue: Anglais
-
The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): Chris Pace
- Durée: 2 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- Narrateur(s): Chris Pace
- Durée: 2 h et 37 min
- Date de publication: 2019-01-15
- Langue: Anglais
-
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Supervivencia
- Afrontar los riesgos no mitigados and Amenazas jamás vistas de la actual guerra geopolítica y cibernética para sobrevivir y prosperar competitivamente en el siglo XXI
- Auteur(s): Khaled Fattal
- Narrateur(s): Keymer Luca
- Durée: 22 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Enfrentando los riesgos no mitigados y las amenazas sin precedentes de los ataques y la guerra Geo-Poli-Cyber™ de hoy para sobrevivir y prosperar competitivamente en la actualidad y en el siglo XXI.
-
Supervivencia
- Afrontar los riesgos no mitigados and Amenazas jamás vistas de la actual guerra geopolítica y cibernética para sobrevivir y prosperar competitivamente en el siglo XXI
- Narrateur(s): Keymer Luca
- Durée: 22 h et 18 min
- Date de publication: 2025-06-18
- Langue: Espagnol
-
Enfrentando los riesgos no mitigados y las amenazas sin precedentes de los ataques y la guerra Geo-Poli-Cyber de hoy para sobrevivir y prosperar competitivamente en la actualidad y en el siglo XXI.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The NIST Framework (CSF) 2.0
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 2 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization - regardless of its size, sector, or maturity - to better understand, assess, prioritize, and communicate its cybersecurity efforts.
-
-
just reading an online free PFF
- Écrit par Haidy Giratallah le 2024-05-28
-
The NIST Framework (CSF) 2.0
- Narrateur(s): Tom Brooks
- Durée: 2 h et 33 min
- Date de publication: 2024-04-02
- Langue: Anglais
-
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Power to Change
- Understanding Bullying and Creating Safe Spaces for Our Children
- Auteur(s): Juan Rodriguez Aceves
- Narrateur(s): Mike Hennessy
- Durée: 3 h et 24 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The Power to Change: Understanding Bullying and Creating Safe Spaces for Our Children, renowned youth advocate Juan Rodriguez Aceves draws from decades of experience to illuminate the complex dynamics of bullying and provide practical, proven solutions for lasting change. Through compelling narratives and evidence-based strategies, he reveals how bullying evolved in the digital age and why traditional approaches often fall short.
-
The Power to Change
- Understanding Bullying and Creating Safe Spaces for Our Children
- Narrateur(s): Mike Hennessy
- Durée: 3 h et 24 min
- Date de publication: 2025-08-18
- Langue: Anglais
-
In The Power to Change, Juan Rodriguez Aceves draws from experience to illuminate the dynamics of bullying and provide solutions for lasting change. Through narratives and evidence-based strategies, he reveals how bullying evolved in the digital age and why traditional approaches often fall short.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-