Computer Security
-
-
Cybersecurity Handbook for Small to Mid-Size Businesses
- Navigating the Cybersecurity Landscape with Confidence!
- Auteur(s): Oscar Fernandez
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
If you are like most business owners, you may feel overwhelmed (and sometimes intimidated) by the topic of cybersecurity. You're not alone! The good news is that help is here. The Cybersecurity Handbook for Small to Mid-Size Businesses is designed to demystify cybersecurity and data protection for you. It provides essential knowledge about these topics, as well as cost-effective solutions you can use to protect your business.
-
Cybersecurity Handbook for Small to Mid-Size Businesses
- Navigating the Cybersecurity Landscape with Confidence!
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h
- Date de publication: 2023-08-11
- Langue: Anglais
-
If you are like most business owners, you may feel overwhelmed (and sometimes intimidated) by the topic of cybersecurity. You're not alone! The Cybersecurity Handbook for Small to Mid-Size Businesses is designed to demystify cybersecurity and data protection for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Tips For: 5G Network Slicing
- Security Considerations for Design, Deployment, and Maintenance
- Auteur(s): Cybersecurity National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 32 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The Enduring Security Framework1 established a working panel comprised of government and industry experts and conducted an in-depth review of the fifth-generation technology for broadband cellular networks standalone network slicing network architecture. This panel assessed the security, risks, benefits, design, deployment, operations, and maintenance of a 5G standalone network slice over two papers: Parts 1 and 2.
-
Tips For: 5G Network Slicing
- Security Considerations for Design, Deployment, and Maintenance
- Narrateur(s): Tom Brooks
- Durée: 3 h et 32 min
- Date de publication: 2023-08-22
- Langue: Anglais
-
The Enduring Security Framework1 established a working panel comprised of government and industry experts and conducted an in-depth review of the fifth-generation technology for broadband cellular networks standalone network slicing network architecture. This panel assessed the security, risks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Scam!
- How to Avoid the Scams That Cost Victims Billions of Dollars Every Year
- Auteur(s): Hope Oje
- Narrateur(s): Alex Freeman
- Durée: 3 h et 39 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Did you know some people earn their living by stealing from others? SCAM! How to Avoid the Scams That Cost Victims Billions of Dollars Every Year is a short, no-nonsense guide that shows you what to watch out for to protect yourself from the 30 most common types of scams circulating right now.
-
Scam!
- How to Avoid the Scams That Cost Victims Billions of Dollars Every Year
- Narrateur(s): Alex Freeman
- Durée: 3 h et 39 min
- Date de publication: 2022-11-23
- Langue: Anglais
-
SCAM! How to Avoid the Scams That Cost Victims Billions of Dollars Every Year is a short, no-nonsense guide that shows you what to watch out for to protect yourself from the 30 most common types of scams circulating right now....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet. A global, multistakeholder community made up of many organizations shapes internet policy, operations, and security. But the ongoing and increasing reliance on the internet underscores the need to understand the risks to its underlying architecture.
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Critical Infrastructure Protection:
- Agencies Need to Assess Adoption of Cybersecurity Guidance - February 2022
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 3 h et 6 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Federal agencies with a lead role to assist and protect one or more of the nation’s 16 critical infrastructures are referred to as sector risk management agencies (SRMAs). The SRMAs for three of the 16 have determined the extent of their sector’s adoption of the National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity (framework). In doing so, lead agencies took actions such as developing sector surveys and conducting technical assessments mapped to framework elements.
-
Critical Infrastructure Protection:
- Agencies Need to Assess Adoption of Cybersecurity Guidance - February 2022
- Narrateur(s): Tom Brooks
- Durée: 3 h et 6 min
- Date de publication: 2022-03-04
- Langue: Anglais
-
Federal agencies with a lead role to assist and protect one or more of the nation’s 16 critical infrastructures are referred to as sector risk management agencies (SRMAs)....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Evolving Electric Power Systems and Cybersecurity
- Auteur(s): Congressional Research Service
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging, and one of the tools for modernizing the system is the incorporation of computerized systems that allow for the rapid monitoring and control of the equipment used in the grid. Connecting these systems to the internet has increased the ability to remotely control aspects of the grid, but this has come with increasing concern for the grid’s cybersecurity.
-
Evolving Electric Power Systems and Cybersecurity
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Date de publication: 2021-11-29
- Langue: Anglais
-
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cloud Security Career Handbook
- A Beginner's Guide to Starting and Succeeding in Cloud Security
- Auteur(s): Timothy Isle
- Narrateur(s): Brent Caraway
- Durée: 2 h et 45 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Cloud security is one of the hottest fields around, with the global cloud market expected to become a multi-billion-dollar industry by 2030. The demand for cloud security professionals is at an all-time high, and now is the best time to take that next step in your cybersecurity career!
-
Cloud Security Career Handbook
- A Beginner's Guide to Starting and Succeeding in Cloud Security
- Narrateur(s): Brent Caraway
- Durée: 2 h et 45 min
- Date de publication: 2023-06-14
- Langue: Anglais
-
Cloud security is one of the hottest fields around, with the global cloud market expected to become a multi-billion-dollar industry by 2030. The demand for cloud security professionals is at an all-time high, and now is the best time to take that next step in your cybersecurity career....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity and Financial System Resilience Report
- Auteur(s): Office of the Comptroller of the Currency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The OCC charters, regulates, and supervises national banks and federal savings associations and licenses, regulates, and supervises federal branches and agencies of foreign banking organizations (collectively the “federal banking system”). As of September 30, 2022, the federal banking system comprised 1,035 banks operating in the United States. In total, the banks within the federal banking system, excluding federal branches and agencies of foreign banks, hold $15.2 trillion of all assets of US commercial banks (64 percent of the total assets held by all US commercial banks).
-
Cybersecurity and Financial System Resilience Report
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Date de publication: 2023-08-10
- Langue: Anglais
-
The OCC charters, regulates, and supervises national banks and federal savings associations and licenses, regulates, and supervises federal branches and agencies of foreign banking organizations (collectively the “federal banking system”).
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Customer Data and Privacy
- The Insights You Need from Harvard Business Review (HBR Insights Series)
- Auteur(s): Harvard Business Review
- Narrateur(s): Christopher Grove, Janet Metzger
- Durée: 2 h et 56 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Customer Data and Privacy: The Insights You Need from Harvard Business Review will help you understand the tangled interdependencies and complexities and develop strategies that allow your company to be good stewards, collecting, using, and storing customer data responsibly.
-
Customer Data and Privacy
- The Insights You Need from Harvard Business Review (HBR Insights Series)
- Narrateur(s): Christopher Grove, Janet Metzger
- Série: HBR Insights Series
- Durée: 2 h et 56 min
- Date de publication: 2020-09-22
- Langue: Anglais
-
Customer Data and Privacy: The Insights You Need from Harvard Business Review will help you understand the tangled interdependencies and complexities and develop strategies that allow your company to be good stewards, collecting, using, and storing customer data responsibly....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
12,24 $ ou gratuit avec l'essai de 30 jours
-
-
-
Control Your Search
- Auteur(s): Alex Adekola
- Narrateur(s): Alex Adekola
- Durée: 1 h et 57 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Learn the techniques and methods used to control information appearing online about you in a search for your name.
-
Control Your Search
- Narrateur(s): Alex Adekola
- Durée: 1 h et 57 min
- Date de publication: 2023-07-05
- Langue: Anglais
-
Learn the techniques and methods used to control information appearing online about you in a search for your name....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Covert Techniques
- Stay Hidden from Enemies, Governments and Large Corporations
- Auteur(s): Brian Bladen
- Narrateur(s): Piers Powis
- Durée: 1 h et 5 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In the modern world, maintaining our privacy is getting harder and harder. We are now in a digital age and it is getting so much easier for somebody to get hold of personal information. But it is not only about criminals looking for personal data. Everyone from marketing companies, government agencies, and the media want to know who you are, where you are, what you do, and what you purchase. You have got to get savvy and guard yourself against those that want to get their hands on your data.
-
Covert Techniques
- Stay Hidden from Enemies, Governments and Large Corporations
- Narrateur(s): Piers Powis
- Durée: 1 h et 5 min
- Date de publication: 2023-05-18
- Langue: Anglais
-
In the modern world, maintaining our privacy is getting harder and harder. We are now in a digital age and it is getting so much easier for somebody to get hold of personal information. But it is not only about criminals looking for personal data....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital Identity and Privacy
- Beginner’s Guide to the Technology that Governs Our Lives
- Auteur(s): Vadim Slavin
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h et 56 min
- Version intégrale
-
Au global5 out of 5 stars 1
-
Performance5 out of 5 stars 1
-
Histoire5 out of 5 stars 1
In today's digital age, digital identity is an integral part of our lives. From online banking to social media, we use digital identities to access services, interact with others, and manage our daily lives. Because of this, we are becoming increasingly vulnerable to exploits targeting our online identity.
-
5 out of 5 stars
-
short & sweet
- Écrit par nil le 2023-05-29
-
Digital Identity and Privacy
- Beginner’s Guide to the Technology that Governs Our Lives
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h et 56 min
- Date de publication: 2023-04-24
- Langue: Anglais
-
In today's digital age, digital identity is an integral part of our lives. From online banking to social media, we use digital identities to access services, interact with others, and manage our daily lives....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
CISA Open Source Software Security Roadmap
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
As a public good, open-source software is supported by diverse and wide-ranging communities—which are composed of individual maintainers, non-profit software foundations, and corporate stewards. CISA must integrate into and support these communities, with a particular focus on the critical OSS components that the federal government and critical infrastructure systems rely upon.
-
CISA Open Source Software Security Roadmap
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2023-09-26
- Langue: Anglais
-
This roadmap lays out how CISA will help enable the secure usage and development of OSS, both within and outside the federal government....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2023-06-12
- Langue: Anglais
-
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
CyberSecurity Metaverse
- Auteur(s): Sajed Khan
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds. There is a lot of marketing hype wrapped up in this idea of the metaverse, from Crypto, NFT, and Blockchain to digital wardrobes. To help you get a sense of how vague and complex a term the "metaverse" can be, this audiobook is written around the parameters of what the metaverse means but more importantly cybersecurity.
-
CyberSecurity Metaverse
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Social Engineer's Playbook: A Practical Guide to Pretexting
- Auteur(s): Jeremiah Talamantes
- Narrateur(s): Tom Taverna
- Durée: 3 h
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others. This book covers an introduction to tools, such as: Maltego, Social Engineer Toolkit, Dradis, Metasploit, and Kali Linux among others. Crucial to any social engineering test is the information used to build it. Discover the most valuable sources of intel and how to put them to use.
-
The Social Engineer's Playbook: A Practical Guide to Pretexting
- Narrateur(s): Tom Taverna
- Durée: 3 h
- Date de publication: 2017-11-06
- Langue: Anglais
-
The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- Auteur(s): Noah Zhang
- Narrateur(s): Gary Westphalen
- Durée: 2 h et 1 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Our society has become saturated with internet-connected devices and trackers everywhere. From home routers to your mobile phones, most people are easily hacked if targeted. In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual.
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- Narrateur(s): Gary Westphalen
- Durée: 2 h et 1 min
- Date de publication: 2019-10-17
- Langue: Anglais
-
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Top Cyber Security Tips
- Securing Your Business, Personal Life, and Family
- Auteur(s): Cybersecurity Bookstore
- Narrateur(s): Maria McCann
- Durée: 1 h et 23 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In today's digital age, it is more important than ever to prioritize cybersecurity in both our personal and professional lives. Top Cyber Security Tips: Securing Your Business, Life, and Family is a comprehensive guide that provides practical, actionable advice for safeguarding your business, your personal information, and your loved ones from cyber threats.
-
Top Cyber Security Tips
- Securing Your Business, Personal Life, and Family
- Narrateur(s): Maria McCann
- Durée: 1 h et 23 min
- Date de publication: 2023-09-08
- Langue: Anglais
-
In today's digital age, it is more important than ever to prioritize cybersecurity in both our personal and professional lives....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
IT-Sicherheit
- Tom's, Cybercrime, Awareness
- Auteur(s): Alexander Förster
- Narrateur(s): Alexander Förster
- Durée: 2 h et 13 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Mit diesem Hörbuch haben Sie die Möglichkeit überall und zu jeder Zeit zu lernen. Egal ob auf dem Weg zur Arbeit, während der Nachtschicht oder zuhause. Entscheiden Sie wann die beste Zeit zum lernen ist. Die 5 Kapitel dieses Hörbuches führen Sie durch alle Themen rund um technisch, organisatorische Maßnahmen zur Datensicherheit. Außerdem werden die gängigen Angriffsarten sog. Cyberkrimineller näher erläutert und mit Fallbeispielen hinterlegt.
-
IT-Sicherheit
- Tom's, Cybercrime, Awareness
- Narrateur(s): Alexander Förster
- Durée: 2 h et 13 min
- Date de publication: 2021-06-28
- Langue: Allemand
-
Mit diesem Hörbuch haben Sie die Möglichkeit überall und zu jeder Zeit zu lernen. Egal ob auf dem Weg zur Arbeit, während der...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Blockchain: Specific Code, Technology, Bitcoin Tips, and Cryptocurrencies
- Auteur(s): Sylvia Anderson
- Narrateur(s): James Mingesbruney
- Durée: 3 h et 31 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
You may or may not be technologically inclined, but whichever way it floats your boat, this guide will show you what you can learn about blockchain technology. Some of the specific details that nobody tells you will come to light, as well as the opportunities this technology has created for, oh… I don’t know… bitcoin millionaires! Yes, we’ll talk about that too, and we will also mention how blockchain technology fits into that.
-
Blockchain: Specific Code, Technology, Bitcoin Tips, and Cryptocurrencies
- Narrateur(s): James Mingesbruney
- Durée: 3 h et 31 min
- Date de publication: 2019-12-23
- Langue: Anglais
-
You may or may not be technologically inclined, but whichever way it floats your boat, this guide will show you what you can learn about blockchain technology....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-