Computer Security
-
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Auteur(s): L.D. Knowings
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
You're not a tech wizard, and you don't need to be. This book speaks directly to you the concerned netizen, the proactive parent, the small business owner, or the budding entrepreneur. It's designed to break down the complexities of cybersecurity into something you can understand and apply.
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Date de publication: 2024-06-05
- Langue: Anglais
-
Worried about hackers? Fight back with confidence! Discover straightforward steps to safeguard your online presence perfect for non-techies and pros alike.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- Auteur(s): Anthony Hack
- Narrateur(s): Robert Plank
- Durée: 3 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking. You don't hear about the ethical hacking in the news, but there are people out there with the same job description fighting the malicious hackers daily, and they get the bad rep.
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- Narrateur(s): Robert Plank
- Durée: 3 h et 29 min
- Date de publication: 2020-03-25
- Langue: Anglais
-
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
To Catch a Predator
- Protecting Your Kids from Online Enemies Already in Your Home
- Auteur(s): Chris Hansen
- Narrateur(s): Todd McLaren
- Durée: 8 h et 28 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In his book To Catch a Predator, Chris Hansen, the on-air correspondent for one of Dateline's most successful series, looks deeper into the world of child predators. The book expands beyond the Dateline series to include more commentary from psychological and criminal experts about the origins and methods of child predators, and includes substantive advice for both parents and children on how to protect kids who use the Internet.
-
To Catch a Predator
- Protecting Your Kids from Online Enemies Already in Your Home
- Narrateur(s): Todd McLaren
- Durée: 8 h et 28 min
- Date de publication: 2007-05-23
- Langue: Anglais
- In his book To Catch a Predator, Chris Hansen, the on-air correspondent for one of Dateline's most successful series, looks deeper into the world of child predators....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Auteur(s): Jack Jones
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want, do what you want, and buy whatever you want. But there is so much more to the deep web than the Hollywood picture of a lawless frontier land. Sure, there are illicit elements to it. It can be a dangerous place if you don't know what you are doing. But, with all that, it should be remembered what the deep web is all about - it's about freedom of speech in a world of censorship and political correctness.
-
-
Provides some practical information
- Écrit par Mary-Anne le 2018-12-15
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Date de publication: 2017-07-14
- Langue: Anglais
- It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want and buy whatever you want....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Auteur(s): Perry Carpenter, Kai Roer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
Really good book, but lots of diagrams
- Écrit par Vince le 2022-12-16
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven insights into how to transform your organization's security culture and reduce human risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: 2 Books in 1 Bargain
- The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
- Auteur(s): Miles Price
- Narrateur(s): Matyas Job Gombos
- Durée: 2 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Inside this audiobook, we aim to show you the importance of staying on top of this threat by learning how to hack. While it is true that hackers have received a bad rep over the years, mostly due to biased media reporting, not all hackers have criminal intentions. This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks.
-
Hacking: 2 Books in 1 Bargain
- The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
- Narrateur(s): Matyas Job Gombos
- Durée: 2 h et 59 min
- Date de publication: 2018-02-23
- Langue: Anglais
-
This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity and Privacy Law Introduction
- Auteur(s): Convocourses
- Narrateur(s): Kim Pepper
- Durée: 3 h et 13 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice.
-
Cybersecurity and Privacy Law Introduction
- Narrateur(s): Kim Pepper
- Durée: 3 h et 13 min
- Date de publication: 2024-02-22
- Langue: Anglais
-
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- Auteur(s): Chris Moschovitis
- Narrateur(s): Sean Pratt
- Durée: 9 h et 9 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Really excellent guide very well read
- Écrit par Joel C LaRusic le 2019-08-29
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- Narrateur(s): Sean Pratt
- Durée: 9 h et 9 min
- Date de publication: 2018-06-26
- Langue: Anglais
-
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
If It's Smart, It's Vulnerable
- Auteur(s): Mikko Hypponen
- Narrateur(s): Rich Miller
- Durée: 7 h et 32 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
All our devices and gadgets—from our refrigerators to our home security systems—are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing.
-
If It's Smart, It's Vulnerable
- Narrateur(s): Rich Miller
- Durée: 7 h et 32 min
- Date de publication: 2022-09-27
- Langue: Anglais
-
Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Auteur(s): Aram Sinnreich, Jesse Gilbert
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Date de publication: 2024-04-30
- Langue: Anglais
-
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
There's a War Going On but No One Can See It
- Auteur(s): Huib Modderkolk
- Narrateur(s): Omar Baroud
- Durée: 8 h et 42 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us.
-
There's a War Going On but No One Can See It
- Narrateur(s): Omar Baroud
- Durée: 8 h et 42 min
- Date de publication: 2021-09-02
- Langue: Anglais
-
Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
19,12 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Dark Web and Scams
- A Guide for Personal Cybersecurity
- Auteur(s): Ivette Smith
- Narrateur(s): Mike Martinez
- Durée: 4 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Dark Web and Scams by Ivette Ibarra Smith is an in-depth guide to understanding the dark web and various cyber scams, aiming to improve personal cybersecurity. The book covers several topics, starting with an exploration of the dark web—demystifying its role as both a space for illegal activities and a haven for privacy-focused individuals such as journalists and whistleblowers.
-
The Dark Web and Scams
- A Guide for Personal Cybersecurity
- Narrateur(s): Mike Martinez
- Durée: 4 h et 5 min
- Date de publication: 2025-03-10
- Langue: Anglais
-
The Dark Web and Scams by Ivette Ibarra Smith is an in-depth guide to understanding the dark web and various cyber scams, aiming to improve personal cybersecurity.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cypherpunks
- Freedom and the Future of the Internet
- Auteur(s): Julian Assange
- Narrateur(s): Tom Pile
- Durée: 4 h et 13 min
- Version intégrale
-
Au global5
-
Performance4
-
Histoire4
Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s. Now, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us.
-
-
A Prerequisite for Living a Dignified Life in the Modern World
- Écrit par Dustin le 2024-05-28
-
Cypherpunks
- Freedom and the Future of the Internet
- Narrateur(s): Tom Pile
- Durée: 4 h et 13 min
- Date de publication: 2013-06-10
- Langue: Anglais
- Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,50 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital for Good
- Raising Kids to Thrive in an Online World
- Auteur(s): Richard Culatta
- Narrateur(s): Adam Verner
- Durée: 5 h et 58 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Technology can be a powerful tool for learning, for solving humanity's toughest problems, and for bringing us closer together. How can we raise healthy kids who know how to take advantage of the good technology can bring to their lives, while avoiding the bad? It's time to start a new conversation. Digital for Good offers a refreshingly positive framework for preparing kids to be successful in a digital world - one that shifts the focus away from what kids shouldn't do and instead encourages them to use technology proactively and productively.
-
Digital for Good
- Raising Kids to Thrive in an Online World
- Narrateur(s): Adam Verner
- Durée: 5 h et 58 min
- Date de publication: 2021-07-21
- Langue: Anglais
-
Digital for Good offers a refreshingly positive framework for preparing kids to be successful in a digital world - one that shifts the focus away from what kids shouldn't do and instead encourages them to use technology proactively and productively....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Auteur(s): Jeffrey Caruso
- Narrateur(s): Mike Lenz
- Durée: 4 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Narrateur(s): Mike Lenz
- Durée: 4 h et 41 min
- Date de publication: 2025-04-29
- Langue: Anglais
-
Cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,02 $ ou gratuit avec l'essai de 30 jours
-
-
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Auteur(s): Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website.
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,47 $ ou gratuit avec l'essai de 30 jours
-
-
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- Auteur(s): Omar Santos, Petar Radanliev
- Narrateur(s): Max Newland
- Durée: 11 h et 35 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- Narrateur(s): Max Newland
- Durée: 11 h et 35 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
As artificial intelligence becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,27 $ ou gratuit avec l'essai de 30 jours
-
-
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- Auteur(s): L.D. Knowings
- Narrateur(s): KC Wayman
- Durée: 3 h et 20 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets. Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach? We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- Narrateur(s): KC Wayman
- Durée: 3 h et 20 min
- Date de publication: 2024-03-08
- Langue: Anglais
-
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Malware Detection & Threats Made Easy!
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 1 h et 24 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Is malware what you want to learn? Always wondered how malware works? Does it interest you how viruses compromise your computer? Listen to this book to discover everything you need to know about tech threats. Learn step by step how to increase your malware skill set. Learn how to detect threats on your computer systems. All the basic knowledge you need is here!
-
Malware Detection & Threats Made Easy!
- Narrateur(s): Millian Quinteros
- Durée: 1 h et 24 min
- Date de publication: 2016-02-22
- Langue: Anglais
- Learn step by step how to increase your malware skill set. Learn how to detect threats on your computer systems. All the basic knowledge you need is here!...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-