Computer Security
-
-
Tutto sulla tecnologia Blockchain [Blockchain Technology Explained]
- La migliore guida per principianti su Blockchain, Mining, Bitcoin, Ethereum, Litecoin, Zcash, Monero... [The Ultimate Beginner’s Guide About Blockchain Wallet, Mining, Bitcoin, Ethereum, Litecoin, Zcash, Monero...]
- Auteur(s): Alan T. Norman
- Narrateur(s): Fabio Giua
- Durée: 3 h et 3 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Invece di parlare di investimenti, questo libro si concentrerà su come funziona la tecnologia blockchain e su come potrebbe essere utilizzata in futuro.
-
Tutto sulla tecnologia Blockchain [Blockchain Technology Explained]
- La migliore guida per principianti su Blockchain, Mining, Bitcoin, Ethereum, Litecoin, Zcash, Monero... [The Ultimate Beginner’s Guide About Blockchain Wallet, Mining, Bitcoin, Ethereum, Litecoin, Zcash, Monero...]
- Narrateur(s): Fabio Giua
- Durée: 3 h et 3 min
- Date de publication: 2019-12-11
- Langue: Italien
-
Invece di parlare di investimenti, questo libro si concentrerà su come funziona la tecnologia blockchain e su come potrebbe essere utilizzata in futuro....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
11,17 $ ou gratuit avec l'essai de 30 jours
-
-
-
Nine Steps to Success
- An ISO27001:2013 Implementation Overview
- Auteur(s): Alan Calder
- Narrateur(s): Liam Gerrard
- Durée: 2 h et 58 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Now in its third edition, Nine Steps to Success has been completely updated to reflect the implementation methodology used by IT Governance consultants in hundreds of successful ISMS implementations around the world and covers each element of the ISO 27001 project in simple, nontechnical language. If you’re tackling ISO 27001 for the first time, Nine Steps to Success will give you the guidance you need to get to grips with the Standard’s requirements and ensure your implementation project is a success - from inception to certification.
-
Nine Steps to Success
- An ISO27001:2013 Implementation Overview
- Narrateur(s): Liam Gerrard
- Durée: 2 h et 58 min
- Date de publication: 2018-12-04
- Langue: Anglais
-
Now in its third edition, Nine Steps to Success has been completely updated to reflect the implementation methodology used by IT Governance consultants in hundreds of successful ISMS implementations around the world....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Non-Tech Entrepreneurs
- Essential Digital Protection for Business Owners
- Auteur(s): Nafeez Imtiaz
- Narrateur(s): Aesha Zephyr
- Durée: 4 h et 24 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In Cybersecurity for Non-Tech Entrepreneurs, Nafeez Imtiaz offers a lifeline for business builders who have zero interest in becoming tech experts but know they can’t afford to be digitally naive. This isn’t another jargon-filled guide written for engineers—it’s a vibrant, real-world playbook packed with stories, close calls, and lessons learned from scrappy startups and friends who trusted the wrong links, lost precious data, or found themselves locked out of their own creations.
-
Cybersecurity for Non-Tech Entrepreneurs
- Essential Digital Protection for Business Owners
- Narrateur(s): Aesha Zephyr
- Durée: 4 h et 24 min
- Date de publication: 2025-08-07
- Langue: Anglais
-
In Cybersecurity for Non-Tech Entrepreneurs, Nafeez Imtiaz offers a lifeline for business builders who have zero interest in becoming tech experts but know they can’t afford to be digitally naive.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Auteur(s): Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Date de publication: 2024-05-21
- Langue: Anglais
-
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,30 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hack to the Future
- How World Governments Relentlessly Pursue and Domesticate Hackers
- Auteur(s): Emily Crose
- Narrateur(s): Erin deWard
- Durée: 10 h et 24 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Veteran information security professional Emily Crose delivers a deep dive into the history of the United States government's nuanced relationship with hacker culture and the role the latter has played in the former's domestic policy and geopolitics. In the book, you'll learn about significant events that have changed the way the hacking community has been perceived by the public, the state, and other hackers.
-
Hack to the Future
- How World Governments Relentlessly Pursue and Domesticate Hackers
- Narrateur(s): Erin deWard
- Durée: 10 h et 24 min
- Date de publication: 2025-02-25
- Langue: Anglais
-
Veteran information security professional Emily Crose delivers a deep dive into the history of the United States government's nuanced relationship with hacker culture and the role the latter has played in the former's domestic policy and geopolitics.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
Data and Privacy in the Age of Automation
- Auteur(s): E.O Edwin
- Narrateur(s): Timothy Burke
- Durée: 1 h et 3 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
This book gives a complete insight into how data and privacy work in the modern world, and how automation can threaten your livelihood. With the development of more and more technology, we must be more cautious about how it influences our personal, social, and work lives.
-
Data and Privacy in the Age of Automation
- Narrateur(s): Timothy Burke
- Durée: 1 h et 3 min
- Date de publication: 2021-11-02
- Langue: Anglais
-
This book gives a complete insight into how data and privacy work in the modern world, and how automation can threaten your livelihood. With the development of more and more technology, we must be more cautious about how it influences our personal, social, and work lives....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: Hacking Firewalls & Bypassing Honeypots
- Auteur(s): Alex Wagner
- Narrateur(s): Jack Bellows
- Durée: 3 h et 44 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. The main focus of this audiobook is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems, or Honeypots work. Your listening of this audiobook will boost your knowledge on what is possible in today’s hacking world and help you to become an Ethical Hacker aka Penetration Tester.
-
Hacking: Hacking Firewalls & Bypassing Honeypots
- Narrateur(s): Jack Bellows
- Durée: 3 h et 44 min
- Date de publication: 2020-05-22
- Langue: Anglais
-
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,52 $ ou gratuit avec l'essai de 30 jours
-
-
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- Auteur(s): Anthony Farrior
- Narrateur(s): Jennifer Workman
- Durée: 14 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts, tools, and techniques. This study guide is designed to help you organize your study efforts and cover all essential topics required to pass the CEH certification exam.
-
2024 Certified Ethical Hacker (CEH) Certification Study Guide
- Narrateur(s): Jennifer Workman
- Durée: 14 min
- Date de publication: 2024-07-01
- Langue: Anglais
-
The Certified Ethical Hacker (CEH) certification, offered by the EC-Council, is a globally recognized credential that validates your skills in ethical hacking and penetration testing. Preparing for the CEH exam requires a thorough understanding of various cybersecurity concepts and techniques.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Sentinel Squad
- In the Shadows of a Cyber Hacker
- Auteur(s): Robert L Cogmon, Robert L. Cogmon
- Narrateur(s): Dalan Decker
- Durée: 2 h et 46 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Digital Heroism: Cyber security experts are portrayed in the manuscript as contemporary heroes who bravely, shrewdly, and strategically defeat cyberattacks. Characters such as Deja Digital serve as examples of the value of technical know-how and inventiveness in building defenses against cyberattacks.
-
The Sentinel Squad
- In the Shadows of a Cyber Hacker
- Narrateur(s): Dalan Decker
- Durée: 2 h et 46 min
- Date de publication: 2024-05-29
- Langue: Anglais
-
Digital Heroism: Cyber security experts are portrayed in the manuscript as contemporary heroes who bravely, shrewdly, and strategically defeat cyberattacks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyberspace Guardians
- A Comprehensive Guide for Choosing the Right CISO
- Auteur(s): Dr. Sylvester Cotton
- Narrateur(s): Chris Walsh
- Durée: 2 h et 3 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Dive into the intriguing world of digital defense with Dr. Sylvester “Sly” Cotton’s masterpiece, “Cyberspace Guardians.” In an era dominated by an intricate web of technology, Dr. Cotton unravels the mysteries of safeguarding the vast realm of cyberspace. This book is your guiding light in the quest to understand the role of a Chief Information Security Officer (CISO), the sentinel of our digital universes. The labyrinth of cyberspace is riddled with unseen dangers, lurking shadows, and unseen adversaries seeking to undermine our technological advancements.
-
Cyberspace Guardians
- A Comprehensive Guide for Choosing the Right CISO
- Narrateur(s): Chris Walsh
- Durée: 2 h et 3 min
- Date de publication: 2024-05-08
- Langue: Anglais
-
Dive into the intriguing world of digital defense with Dr. Sylvester “Sly” Cotton’s masterpiece, “Cyberspace Guardians.” In an era dominated by an intricate web of technology, Dr. Cotton unravels the mysteries of safeguarding the vast realm of cyberspace.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
いまさら聞けないWeb3、NFT、メタバースについて増田雅史先生に聞いてみた
- (学研)
- Narrateur(s): 大野海 夏大
- Série: 〇〇先生に聞いてみたシリーズ, Livre 増田 雅史 先生
- Durée: 3 h et 38 min
- Date de publication: 2025-01-31
- Langue: Japonais
- 驚異的な勢いでビジネス化が進む「メタバース」や「NFT」、今後注目される「DAO」「Web3」について、イラストでわかりやすく解説。誰もが抱くシンプルな疑問をひとつずつ解決します。
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Secure Our World: Cybersecurity Awareness Month
- 2023 Partner Toolkit
- Auteur(s): National Cybersecurity Alliance
- Narrateur(s): Tom Brooks
- Durée: 2 h et 10 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Held every October, Cybersecurity Awareness Month is a collaboration between the government and private industry to empower everyone to protect their personal data from digital forms of crime. This toolkit is dedicated to creating resources and communications for organizations to talk to their employees and customers about staying safe online.
-
Secure Our World: Cybersecurity Awareness Month
- 2023 Partner Toolkit
- Narrateur(s): Tom Brooks
- Durée: 2 h et 10 min
- Date de publication: 2023-10-19
- Langue: Anglais
-
Held every October, Cybersecurity Awareness Month is a collaboration between the government and private industry to empower everyone to protect their personal data from digital forms of crime....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- Auteur(s): Taimur Ijlal
- Narrateur(s): Craig Neutzling
- Durée: 1 h et 31 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- Narrateur(s): Craig Neutzling
- Durée: 1 h et 31 min
- Date de publication: 2023-07-22
- Langue: Anglais
-
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Unlocked!
- Strategies to Outsmart Hackers, and Online Criminals
- Auteur(s): Miles Lockhart
- Narrateur(s): Lloyd V Dennis
- Durée: 5 h et 5 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Go from cyber-insecure to cyber-savvy—outsmart cyber thieves with this comprehensive guide to a safe, fulfilling online experience—even if online safety is uncharted territory for you! Just 10 years ago, few people could probably envision a world where they could shop with their mobile phone, effortlessly connect their home and work computers, or access literally millions of apps with just one click. The upside of ubiquitous connectivity? Speed, practicality, efficiency. The downside? Data has become gold, and our “treasure” is sadly all too accessible to clever hackers and data thieves.
-
Cybersecurity Unlocked!
- Strategies to Outsmart Hackers, and Online Criminals
- Narrateur(s): Lloyd V Dennis
- Durée: 5 h et 5 min
- Date de publication: 2025-01-13
- Langue: Anglais
-
Go from cyber-insecure to cyber-savvy—outsmart cyber thieves with this comprehensive guide to a safe, fulfilling online experience—even if online safety is uncharted territory for you!
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Practical Guide to GDPR for Small Businesses
- Auteur(s): Nick Ioannou
- Narrateur(s): Douglas Birk
- Durée: 1 h et 33 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The general data protection regulation or GDPR is a 57,500+ worded legislation that applies to every business or organization that handles personal information of those citizens living in EU and the UK, regardless of the size of the organization. For many small businesses, complying with GDPR is a daunting task, but it doesn’t need to be.
-
A Practical Guide to GDPR for Small Businesses
- Narrateur(s): Douglas Birk
- Durée: 1 h et 33 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
The general data protection regulation or GDPR is a 57,500+ worded legislation that applies to every business or organization that handles personal information of those citizens living in EU and the UK, regardless of the size of the organization....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
@War
- The Rise of the Military-Internet Complex
- Auteur(s): Shane Harris
- Narrateur(s): Stephen R. Thorne
- Durée: 9 h et 43 min
- Version intégrale
-
Au global4.5 out of 5 stars 3
-
Performance4.5 out of 5 stars 3
-
Histoire4.5 out of 5 stars 3
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
5 out of 5 stars
-
Eye opening
- Écrit par Etha le 2022-08-02
-
@War
- The Rise of the Military-Internet Complex
- Narrateur(s): Stephen R. Thorne
- Durée: 9 h et 43 min
- Date de publication: 2014-11-11
- Langue: Anglais
- The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,35 $ ou gratuit avec l'essai de 30 jours
-
-
-
Beyond the Firewall
- Enhancing SCADA Security in the Age of Cyber Threats
- Auteur(s): Chukwudi Abalogu
- Narrateur(s): B Fike
- Durée: 4 h et 13 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The background noise of power grids working alongside water pipelines carrying liquid and trains moving along tracks represent the hidden heartbeat of modern civilization which supports our global connectedness. The vital systems supporting our economies and societies remain hidden from everyday view while they sustain both the simple and complex aspects of daily life. At the heart of this critical infrastructure lies a network of sophisticated control systems: SCADA–Supervisory Control and Data Acquisition.
-
Beyond the Firewall
- Enhancing SCADA Security in the Age of Cyber Threats
- Narrateur(s): B Fike
- Durée: 4 h et 13 min
- Date de publication: 2025-06-05
- Langue: Anglais
-
The background noise of power grids working alongside water pipelines carrying liquid and trains moving along tracks represent the hidden heartbeat of modern civilization which supports our global connectedness.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Entrepreneur’s Edge
- A 3-Book Compilation on AI, Cybersecurity, and AR/VR (Empowering Small Businesses)
- Auteur(s): Kimberly Burk Cordova
- Narrateur(s): Hannah Stone
- Durée: 9 h et 29 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The Entrepreneur's Edge is the ultimate guide for small business owners and entrepreneurs who want to harness the power of artificial intelligence, cybersecurity, and augmented/virtual reality to fuel growth and innovation. This all-in-one resource equips you with the knowledge and tools to navigate these transformative technologies with confidence.
-
The Entrepreneur’s Edge
- A 3-Book Compilation on AI, Cybersecurity, and AR/VR (Empowering Small Businesses)
- Narrateur(s): Hannah Stone
- Durée: 9 h et 29 min
- Date de publication: 2024-07-22
- Langue: Anglais
-
The Entrepreneur's Edge is the ultimate guide for small business owners and entrepreneurs who want to harness the power of artificial intelligence, cybersecurity, and augmented/virtual reality to fuel growth and innovation.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Auteur(s): Lester Evans
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Version intégrale
-
Au global2.5 out of 5 stars 2
-
Performance4 out of 5 stars 1
-
Histoire4 out of 5 stars 1
If you want to avoid getting hacked, having your information spread, and discover the world of ethical hacking then pay attention.... Two manuscripts in one audiobook: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyber-Warfare, Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber-Security of Computer Networks, Including Tips on Social Engineering.
-
3 out of 5 stars
-
An interesting read, not a guide or study manual
- Écrit par Joel C LaRusic le 2019-08-06
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Date de publication: 2019-02-07
- Langue: Anglais
-
How hackers use raunchy photos to eke out private information; examples of preposterous social engineering attacks; how there's only one surefire way to protect against hacking; how to lower your exposure to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Auteur(s): David Senecal
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves. The author uses plain language to lift the veil on bots and fraud, making a topic critical to your website's security easy to understand and even easier to implement.
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Date de publication: 2024-08-27
- Langue: Anglais
-
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-