Computer Security
-
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- Auteur(s): Omar Santos, Petar Radanliev
- Narrateur(s): Max Newland
- Durée: 11 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- Narrateur(s): Max Newland
- Durée: 11 h et 35 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
As artificial intelligence becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,27 $ ou gratuit avec l'essai de 30 jours
-
-
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- Auteur(s): Learn Computer Hacking in Deep
- Narrateur(s): Jowanna Lewis
- Durée: 3 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization. Unless and until you are unaware of the basics, you will not be able to use this software. In fact, for carrying out an effective form of ethical hacking, you will need to learn about the various attacks along with the forms of networks. You can easily find the information in this audiobook.
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- Narrateur(s): Jowanna Lewis
- Durée: 3 h et 23 min
- Date de publication: 2020-02-11
- Langue: Anglais
-
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ten Steps to ITSM Success
- Auteur(s): Timothy Rogers, Angelo Esposito
- Narrateur(s): Peter Silverleaf
- Durée: 6 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As organizations seek to boost revenue, cut costs, and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. Ten Steps to ITSM Success helps IT to prepare for this role by providing a detailed and practical guide to implementing ITSM best practices. It is aimed at ITSM practitioners and consultants, but will also be of interest to IT directors and C-suite executives looking to transform the role of IT into a value-creating business partner.
-
Ten Steps to ITSM Success
- Narrateur(s): Peter Silverleaf
- Durée: 6 h et 42 min
- Date de publication: 2018-12-10
- Langue: Anglais
-
As organizations seek to boost revenue, cut costs, and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. This guide helps IT to prepare for this role by providing a detailed and practical guide to implementing ITSM best practices....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- Auteur(s): Christian Espinosa
- Narrateur(s): Kaleo Griffith
- Durée: 6 h et 54 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
wisdom doesn’t go past the title
- Écrit par Douglas Lowney le 2023-01-14
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- Narrateur(s): Kaleo Griffith
- Durée: 6 h et 54 min
- Date de publication: 2021-03-08
- Langue: Anglais
-
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,19 $ ou gratuit avec l'essai de 30 jours
-
-
-
Nothing Is Beyond Our Reach
- America's Techno-Spy Empire
- Auteur(s): Kristie Macrakis
- Narrateur(s): Wendy Tremont King
- Durée: 11 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ever since the earliest days of the Cold War, American intelligence agencies have launched spies in the sky, implanted spies in the ether, burrowed spies underground, sunk spies in the ocean, and even tried to control spies' minds by chemical means. But these weren't human spies. Instead, the United States expanded its reach around the globe through techno-spies. Nothing Is Beyond Our Reach investigates how America's technophiles inadvertently created a global espionage empire: one based on technology, not land.
-
Nothing Is Beyond Our Reach
- America's Techno-Spy Empire
- Narrateur(s): Wendy Tremont King
- Durée: 11 h et 37 min
- Date de publication: 2023-04-25
- Langue: Anglais
-
Nothing Is Beyond Our Reach investigates how America's technophiles inadvertently created a global espionage empire: one based on technology, not land....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
Identity Security for Software Development
- Best Practices That Every Developer Must Know
- Auteur(s): John Walsh, Uzi Ailon, Matt Barker
- Narrateur(s): Tom Perkins
- Durée: 7 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.
-
Identity Security for Software Development
- Best Practices That Every Developer Must Know
- Narrateur(s): Tom Perkins
- Durée: 7 h et 47 min
- Date de publication: 2025-08-26
- Langue: Anglais
-
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Threats
- What Every Engineer Should Learn from Star Wars
- Auteur(s): Adam Shostack
- Narrateur(s): Joe Hempel
- Durée: 10 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a structured and memorable way—about the threats to your systems. You'll move from thinking of security issues as clever one-offs and learn to see the patterns they follow.
-
Threats
- What Every Engineer Should Learn from Star Wars
- Narrateur(s): Joe Hempel
- Durée: 10 h et 7 min
- Date de publication: 2023-03-21
- Langue: Anglais
-
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Auteur(s): Kevin Poulsen
- Narrateur(s): Eric Michael Summerer
- Durée: 8 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Narrateur(s): Eric Michael Summerer
- Durée: 8 h et 8 min
- Date de publication: 2015-02-17
- Langue: Anglais
- The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
On Privacy and Technology
- Auteur(s): Daniel J. Solove
- Narrateur(s): Jonathan Todd Ross
- Durée: 4 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Internationally renowned privacy expert Daniel J. Solove draws from a range of fields, from law to philosophy to the humanities, to illustrate the profound changes technology is wreaking upon our privacy, why they matter, and what can be done about them. Solove provides incisive examinations of key concepts in the digital sphere, including control, manipulation, harm, automation, reputation, consent, prediction, inference, and many others.
-
On Privacy and Technology
- Narrateur(s): Jonathan Todd Ross
- Durée: 4 h et 30 min
- Date de publication: 2025-03-25
- Langue: Anglais
-
Succinct and eloquent, On Privacy and Technology is an essential primer on how to face the threats to privacy in today's age of digital technologies and AI.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,47 $ ou gratuit avec l'essai de 30 jours
-
-
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Auteur(s): Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Date de publication: 2024-05-21
- Langue: Anglais
-
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,30 $ ou gratuit avec l'essai de 30 jours
-
-
-
Fatal System Error
- The Hunt for the New Crime Lords Who Are Bringing Down the Internet
- Auteur(s): Joseph Menn
- Narrateur(s): Christian Rummel
- Durée: 8 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia. His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers.
-
Fatal System Error
- The Hunt for the New Crime Lords Who Are Bringing Down the Internet
- Narrateur(s): Christian Rummel
- Durée: 8 h et 23 min
- Date de publication: 2010-01-11
- Langue: Anglais
- In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Auteur(s): Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website.
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,47 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- Auteur(s): Thomas J. Parenty, Jack J. Domet
- Narrateur(s): Jonathan Todd Ross
- Durée: 5 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- Narrateur(s): Jonathan Todd Ross
- Durée: 5 h et 47 min
- Date de publication: 2019-12-03
- Langue: Anglais
-
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: Computer Hacking, Security Testing, Penetration Testing, and Basic Security
- Auteur(s): Gary Hall, Erin Watson
- Narrateur(s): T. W. Ashworth
- Durée: 3 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you interested in learning about how to hack systems? Do you want to learn how to protect yourself from being hacked? Do you wish to learn the art of ethical hacking? Do you want to know the secret techniques that genius hackers use? Hacking is one of the most misunderstood cyber concepts. The majority of people think of hacking as something evil or illegal, but nothing could be farther from the truth. Indeed, hacking can be a real threat, but if you want to stop someone from hacking you, you must also learn how to hack!
-
Hacking: Computer Hacking, Security Testing, Penetration Testing, and Basic Security
- Narrateur(s): T. W. Ashworth
- Durée: 3 h et 4 min
- Date de publication: 2017-03-09
- Langue: Anglais
- Are you interested in learning about how to hack systems? Do you want to learn how to protect yourself from being hacked? Do you wish to learn the art of ethical hacking? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Swiped
- How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
- Auteur(s): Adam Levin
- Narrateur(s): Adam Levin
- Durée: 7 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Adam Levin, a longtime consumer advocate and identity fraud expert, is your guide to this brave new world. By telling memorable stories and extracting the relevant lessons, he offers a strategy for dealing with these risks. You may not be able to prevent identity theft, but you certainly shouldn't wait until it happens to take action. Levin's approach is defined by the three M's: minimizing risk, monitoring your identity, and managing the damage.
-
Swiped
- How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
- Narrateur(s): Adam Levin
- Durée: 7 h et 23 min
- Date de publication: 2015-11-16
- Langue: Anglais
- Swiped is a practical, lively audiobook that is essential to surviving the ever-changing world of online security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
38,96 $ ou gratuit avec l'essai de 30 jours
-
-
-
Guía de Ciberseguridad
- Descubre los Secretos para Detectar, Prevenir y Proteger tus Dispositivos de Amenazas, Estafas Cibernéticas y Hackers
- Auteur(s): Joseph Mendoza
- Narrateur(s): Keren Iturriago
- Durée: 4 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
¿Te parece imposible la idea de defender tu presencia digital de amenazas invisibles? Aquí tienes una verdad contundente: no necesitas ser un experto en tecnología para dominar los conceptos básicos de ciberseguridad. De hecho, solo estás a un libro de transformar tu vida digital y proteger tu información personal y profesional contra las fuerzas oscuras del mundo cibernético.
-
Guía de Ciberseguridad
- Descubre los Secretos para Detectar, Prevenir y Proteger tus Dispositivos de Amenazas, Estafas Cibernéticas y Hackers
- Narrateur(s): Keren Iturriago
- Durée: 4 h et 3 min
- Date de publication: 2025-03-28
- Langue: Espagnol
-
Aquí tienes una verdad contundente: no necesitas ser un experto en tecnología para dominar los conceptos básicos de ciberseguridad. De hecho, solo estás a un libro de transformar tu vida digital y proteger tu información personal y profesional contra las fuerzas oscuras del mundo cibernético.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
OSCP Offensive Security Certified Professional
- Practice Tests with Answers to Pass the OSCP Ethical Hacking Certification Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Whether you're a budding cybersecurity enthusiast or a seasoned professional seeking to fortify your skill set, this book is your gateway to success. Equip yourself with the knowledge, strategies, and expertise essential not just for acing an exam, but for thriving in a dynamic cybersecurity career.
-
OSCP Offensive Security Certified Professional
- Practice Tests with Answers to Pass the OSCP Ethical Hacking Certification Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 8 min
- Date de publication: 2023-12-03
- Langue: Anglais
-
Delve into a multifaceted exploration of offensive security practices, meticulously designed to equip enthusiasts and seasoned professionals alike with the prowess and acumen required to excel in the ever-evolving cybersecurity landscape....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Risk Management
- Mastering the Fundamentals Using the NIST Cybersecurity Framework
- Auteur(s): Cynthia Brumfield, Brian Haugli - contributor
- Narrateur(s): Ulf Bjorklund
- Durée: 5 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers an up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers listeners overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks.
-
Cybersecurity Risk Management
- Mastering the Fundamentals Using the NIST Cybersecurity Framework
- Narrateur(s): Ulf Bjorklund
- Durée: 5 h et 55 min
- Date de publication: 2025-09-16
- Langue: Anglais
-
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers an exploration of the fundamentals of cybersecurity risk planning and management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,47 $ ou gratuit avec l'essai de 30 jours
-
-
-
To Save Everything, Click Here
- The Folly of Technological Solutionism
- Auteur(s): Evgeny Morozov
- Narrateur(s): Stephen Hoye
- Durée: 15 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In the very near future, smart “technologies and big data” will allow us to make large-scale and sophisticated interventions in politics, culture, and everyday life. Technology will allow us to solve problems in highly original ways and create new incentives to get more people to do the right thing. But how will such “solutionism” affect our society, once deeply political, moral, and irresolvable dilemmas are recast as uncontroversial and easily manageable matters of technological efficiency?
-
-
I will not think about solutions as I had before
- Écrit par Wendy le 2019-05-19
-
To Save Everything, Click Here
- The Folly of Technological Solutionism
- Narrateur(s): Stephen Hoye
- Durée: 15 h et 59 min
- Date de publication: 2013-12-17
- Langue: Anglais
- In the very near future, smart technologies and big data will allow us to make large-scale and sophisticated interventions in politics, culture, and everyday life....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
40,25 $ ou gratuit avec l'essai de 30 jours
-
-
-
Beginners Guide to VPNs
- Your Secret Tunnel to Online Privacy
- Auteur(s): Alsden Keir
- Narrateur(s): Michelle Peitz
- Durée: 2 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In a world where every click is tracked, every search is analyzed, and every online move leaves a trace, digital privacy has never been more critical or vulnerable. Beginners Guide to VPNs: Your Secret Tunnel to Online Privacy by Alsden Keir is your essential roadmap to understanding, choosing, and using Virtual Private Networks (VPNs) confidently and clearly. Far from being a tool for tech experts or conspiracy theorists, a VPN is a simple, effective solution for anyone who values online privacy, security, and freedom.
-
Beginners Guide to VPNs
- Your Secret Tunnel to Online Privacy
- Narrateur(s): Michelle Peitz
- Durée: 2 h et 22 min
- Date de publication: 2025-06-10
- Langue: Anglais
-
In a world where every click is tracked, every search is analysed, and every online move leaves a trace, digital privacy has never been more critical or vulnerable.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-