Computer Security
-
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Auteur(s): Gabriella Coleman
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Date de publication: 2017-01-31
- Langue: Anglais
- Anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,82 $ ou gratuit avec l'essai de 30 jours
-
-
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Date de publication: 2024-03-06
- Langue: Anglais
-
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Protecting Your Internet Identity
- Are You Naked Online?
- Auteur(s): Ted Claypoole, Theresa Payton, Chris Swecker - foreword
- Narrateur(s): Theresa Payton, Christopher Lane
- Durée: 12 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you. In the years since this book was first published, the Internet profile and reputation have grown more important in the vital human activities of work, school and relationships.
-
Protecting Your Internet Identity
- Are You Naked Online?
- Narrateur(s): Theresa Payton, Christopher Lane
- Durée: 12 h et 40 min
- Date de publication: 2020-04-28
- Langue: Anglais
-
People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
32,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Beginners Guide to Hacking and Cyber Security: Written by former Army Cyber Security Analyst and Federal Agent
- Information Technology by Sam
- Auteur(s): Samuel Castro
- Narrateur(s): Devon Michael Scott
- Durée: 2 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Welcome to the first and only book you will ever need on the topic of cyber law and cyber security. learn hacking techniques, cyber law, and white hat operations. Perfect for Beginners: If you’re brand new or an expert in cyber security, you’ll still find this guide a solid purchase to add to your skill set, develop new skills and techniques, or revamp old ones and sharpen yourself with cyber security and cyber law.
-
Beginners Guide to Hacking and Cyber Security: Written by former Army Cyber Security Analyst and Federal Agent
- Information Technology by Sam
- Narrateur(s): Devon Michael Scott
- Durée: 2 h et 33 min
- Date de publication: 2019-06-13
- Langue: Anglais
-
Welcome to the first and only book you will ever need on the topic of cyber law and cyber security. learn hacking techniques, cyber law, and white hat operations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Cyber Security Handbook
- Prepare for, Respond to and Recover from Cyber Attacks with the It Governance Cyber Resilience Framework (CRF)
- Auteur(s): Alan Calder
- Narrateur(s): Stephen Perring
- Durée: 7 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
-
The Cyber Security Handbook
- Prepare for, Respond to and Recover from Cyber Attacks with the It Governance Cyber Resilience Framework (CRF)
- Narrateur(s): Stephen Perring
- Durée: 7 h et 59 min
- Date de publication: 2021-11-05
- Langue: Anglais
-
This audiobook is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF)....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Auteur(s): Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Date de publication: 2024-05-21
- Langue: Anglais
-
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,30 $ ou gratuit avec l'essai de 30 jours
-
-
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Auteur(s): Andy Greenberg
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Date de publication: 2012-09-17
- Langue: Anglais
- The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Start a Cybersecurity Consulting Business
- Your Guide to Launching, Managing, and Growing a Cybersecurity Consultancy
- Auteur(s): VentureNest Books
- Narrateur(s): Andy David Jones
- Durée: 2 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In an era where digital threats are ever-present, the need for cybersecurity solutions is at an all-time high. How to Start a Cybersecurity Consulting Business is a crucial resource for those who want to establish a successful consulting firm in this booming industry.
-
How to Start a Cybersecurity Consulting Business
- Your Guide to Launching, Managing, and Growing a Cybersecurity Consultancy
- Narrateur(s): Andy David Jones
- Durée: 2 h et 59 min
- Date de publication: 2025-04-18
- Langue: Anglais
-
In an era where digital threats are ever-present, the need for cybersecurity solutions is at an all-time high. How to Start a Cybersecurity Consulting Business is a crucial resource for those who want to establish a successful consulting firm in this booming industry.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- Auteur(s): Adam Segal
- Narrateur(s): Don Hagen
- Durée: 10 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Internet today connects roughly 2.7 billion people around the world, and booming interest in the "Internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization, and ownership of information.
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- Narrateur(s): Don Hagen
- Durée: 10 h et 40 min
- Date de publication: 2016-02-18
- Langue: Anglais
- The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
38,96 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking Artificial Intelligence
- A Leader's Guide from Deepfakes to Breaking Deep Learning
- Auteur(s): Davey Gibian
- Narrateur(s): Tom Parks
- Durée: 5 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. Hacking Artificial Intelligence sheds light on these hacking risks, explaining them to those who can make a difference. This book is the first-ever layman's guide to the new world of hacking AI and introduces the field to thousands of people who should be aware of these risks. From a security perspective, AI is today where the internet was thirty years ago. It is wide open and can be exploited.
-
Hacking Artificial Intelligence
- A Leader's Guide from Deepfakes to Breaking Deep Learning
- Narrateur(s): Tom Parks
- Durée: 5 h et 27 min
- Date de publication: 2022-05-05
- Langue: Anglais
-
It is no surprise that after years of development and recent breakthroughs, artificial intelligence is rapidly transforming businesses, consumer electronics, and the national security landscape. But like all digital technologies, AI can fail and be left vulnerable to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
CC Certified in Cybersecurity
- The Complete ISC2 Certification Study Guide
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification. Navigating through fundamental concepts and advanced techniques, this book serves as a trusted companion for those seeking to master the intricate landscape of cybersecurity.
-
CC Certified in Cybersecurity
- The Complete ISC2 Certification Study Guide
- Narrateur(s): Tom Brooks
- Durée: 5 h et 2 min
- Date de publication: 2024-04-09
- Langue: Anglais
-
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Auteur(s): Sean D. Mack
- Narrateur(s): William Sarris
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The DevSecOps Playbook: Deliver Continuous Security at Speed, the chief information and information security officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You'll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You'll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks.
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Narrateur(s): William Sarris
- Durée: 7 h et 9 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
An essential and up-to-date guide to DevSecOps....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: A Beginners Guide to Your First Computer Hack
- Learn to Crack a Wireless Network, Basic Security Penetration Made Easy and Step-by-Step Kali Linux
- Auteur(s): Kevin White
- Narrateur(s): Matt Montanez
- Durée: 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking will demand your full dedication and interest and also a desire and a craving for knowledge and constant advancement. If your goal is to be a hacker, this is the audiobook to start with! This audiobook contains proven steps and strategies on how to hack a wireless network, carry out a penetration test, and so much more. It gives an insight to the most used hacking techniques and how to develop your basic skills.
-
Hacking: A Beginners Guide to Your First Computer Hack
- Learn to Crack a Wireless Network, Basic Security Penetration Made Easy and Step-by-Step Kali Linux
- Narrateur(s): Matt Montanez
- Durée: 31 min
- Date de publication: 2018-02-26
- Langue: Anglais
-
This audiobook contains proven steps and strategies on how to hack a wireless network, carry out a penetration test, and so much more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Swiped
- How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
- Auteur(s): Adam Levin
- Narrateur(s): Adam Levin
- Durée: 7 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Adam Levin, a longtime consumer advocate and identity fraud expert, is your guide to this brave new world. By telling memorable stories and extracting the relevant lessons, he offers a strategy for dealing with these risks. You may not be able to prevent identity theft, but you certainly shouldn't wait until it happens to take action. Levin's approach is defined by the three M's: minimizing risk, monitoring your identity, and managing the damage.
-
Swiped
- How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
- Narrateur(s): Adam Levin
- Durée: 7 h et 23 min
- Date de publication: 2015-11-16
- Langue: Anglais
- Swiped is a practical, lively audiobook that is essential to surviving the ever-changing world of online security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
38,96 $ ou gratuit avec l'essai de 30 jours
-
-
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Auteur(s): Jack Jones
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want, do what you want, and buy whatever you want. But there is so much more to the deep web than the Hollywood picture of a lawless frontier land. Sure, there are illicit elements to it. It can be a dangerous place if you don't know what you are doing. But, with all that, it should be remembered what the deep web is all about - it's about freedom of speech in a world of censorship and political correctness.
-
-
Provides some practical information
- Écrit par Mary-Anne le 2018-12-15
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Date de publication: 2017-07-14
- Langue: Anglais
- It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want and buy whatever you want....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Worm
- The First Digital World War
- Auteur(s): Mark Bowden
- Narrateur(s): Christopher Lane
- Durée: 7 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide. When Conficker was unleashed in November 2008, cybersecurity experts did not know what to make of it. Exploiting security flaws in Microsoft Windows, it grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks.
-
Worm
- The First Digital World War
- Narrateur(s): Christopher Lane
- Durée: 7 h et 8 min
- Date de publication: 2011-10-11
- Langue: Anglais
- Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Docker in Action
- Auteur(s): Jeff Nickoloff
- Narrateur(s): Aiden Humphreys
- Durée: 10 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Docker in Action teaches listeners how to create, deploy, and manage applications hosted in Docker containers. After starting with a clear explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications. You will also learn how to run programs securely and how to manage shared resources. Using carefully designed examples, the book teaches you how to orchestrate containers and applications from installation to removal.
-
Docker in Action
- Narrateur(s): Aiden Humphreys
- Durée: 10 h et 12 min
- Date de publication: 2018-11-08
- Langue: Anglais
-
Docker in Action teaches listeners how to create, deploy, and manage applications hosted in Docker containers. After an explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Cyber Risk Handbook
- Creating and Measuring Effective Cybersecurity Capabilities
- Auteur(s): Domenic Antonucci
- Narrateur(s): Jon Vertullo
- Durée: 11 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Cyber Risk Handbook is the practitioner's guide to implementing, measuring, and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations and cross-functional solutions for enterprise-wide improvement.
-
The Cyber Risk Handbook
- Creating and Measuring Effective Cybersecurity Capabilities
- Narrateur(s): Jon Vertullo
- Durée: 11 h et 59 min
- Date de publication: 2024-11-12
- Langue: Anglais
-
The Cyber Risk Handbook is the practitioner's guide to implementing, measuring, and improving the counter-cyber capabilities of the modern enterprise.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Auteur(s): Raymond Phillips
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself. I am sure if you are considering this book, you too have a reason, but going through this process, I have learned a few valuable lessons. This book is all about those lessons, so you don't have to learn on the go as I had to. Instead, you can use this book as a guide and just follow the step by step process and see yourself disappear from the big World Wide Web.
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Date de publication: 2016-12-14
- Langue: Anglais
- Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
System of Controls
- I.T.'s Guide to Managing Cyber Risk
- Auteur(s): William D. Reed
- Narrateur(s): Brian Guinn
- Durée: 14 h et 57 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book takes a systemic look at our environment to better understand the risk landscape and take the lead to improve the management of cyber risk. To mitigate cyber risk from disrupting our organization's achievement of its business goals, IT needs to transform how they approach security. This book lays the foundation for a transformative journey for IT to re-imagine their cyber security program through the lens of systems thinking in the context of risk management.
-
System of Controls
- I.T.'s Guide to Managing Cyber Risk
- Narrateur(s): Brian Guinn
- Durée: 14 h et 57 min
- Date de publication: 2025-03-26
- Langue: Anglais
-
This book takes a systemic look at our environment to better understand the risk landscape and take the lead to improve the management of cyber risk. To mitigate cyber risk from disrupting our organization's achievement of its business goals, IT needs to transform how they approach security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,27 $ ou gratuit avec l'essai de 30 jours
-