Computer Security
-
-
Protecting Your Internet Identity
- Are You Naked Online?
- Auteur(s): Ted Claypoole, Theresa Payton, Chris Swecker - foreword
- Narrateur(s): Theresa Payton, Christopher Lane
- Durée: 12 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you. In the years since this book was first published, the Internet profile and reputation have grown more important in the vital human activities of work, school and relationships.
-
Protecting Your Internet Identity
- Are You Naked Online?
- Narrateur(s): Theresa Payton, Christopher Lane
- Durée: 12 h et 40 min
- Date de publication: 2020-04-28
- Langue: Anglais
-
People research everything online - shopping, school, jobs, travel - and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
32,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Think Like a Hacker
- A Sysadmin's Guide to Cybersecurity
- Auteur(s): Michael J. Melone
- Narrateur(s): Mike Wood
- Durée: 2 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage. To defend against hackers, you must first learn to think like a hacker.
-
Think Like a Hacker
- A Sysadmin's Guide to Cybersecurity
- Narrateur(s): Mike Wood
- Durée: 2 h et 59 min
- Date de publication: 2018-02-09
- Langue: Anglais
-
To defend against hackers, you must first learn to think like a hacker....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
If It's Smart, It's Vulnerable
- Auteur(s): Mikko Hypponen
- Narrateur(s): Rich Miller
- Durée: 7 h et 32 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
All our devices and gadgets—from our refrigerators to our home security systems—are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing.
-
If It's Smart, It's Vulnerable
- Narrateur(s): Rich Miller
- Durée: 7 h et 32 min
- Date de publication: 2022-09-27
- Langue: Anglais
-
Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Blockchain Innovator's Handbook
- A Leader's Guide to Understanding, Adopting and Succeeding with This Disruptive Technology
- Auteur(s): Conor Svensson
- Narrateur(s): Conor Svensson, Leyla Hart-Svensson, Raoul Pal
- Durée: 4 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Are you struggling to understand what blockchain technology does and how it can benefit your business? "The Blockchain Innovator's Handbook" is an accessible guide for leaders. It covers everything from opportunity identification to implementation and shows how to unlock new business opportunities in a fast-changing environment.
-
The Blockchain Innovator's Handbook
- A Leader's Guide to Understanding, Adopting and Succeeding with This Disruptive Technology
- Narrateur(s): Conor Svensson, Leyla Hart-Svensson, Raoul Pal
- Durée: 4 h et 49 min
- Date de publication: 2023-03-29
- Langue: Anglais
-
Are you struggling to understand what blockchain technology does and how it can benefit your business? "The Blockchain Innovator's Handbook" is an...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,97 $ ou gratuit avec l'essai de 30 jours
-
-
-
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Auteur(s): Heidi Boghosian
- Narrateur(s): Charles Hubble
- Durée: 7 h et 27 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities. No one is exempt from data mining: by owning a smartphone, or using social media or a credit card, we...
-
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Narrateur(s): Charles Hubble
- Série: Myths Made in America
- Durée: 7 h et 27 min
- Date de publication: 2021-07-13
- Langue: Anglais
- An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities. No one is exempt from data mining: by owning a smartphone, or using social media or a credit card, we...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
Docker in Action
- Auteur(s): Jeff Nickoloff
- Narrateur(s): Aiden Humphreys
- Durée: 10 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Docker in Action teaches listeners how to create, deploy, and manage applications hosted in Docker containers. After starting with a clear explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications. You will also learn how to run programs securely and how to manage shared resources. Using carefully designed examples, the book teaches you how to orchestrate containers and applications from installation to removal.
-
Docker in Action
- Narrateur(s): Aiden Humphreys
- Durée: 10 h et 12 min
- Date de publication: 2018-11-08
- Langue: Anglais
-
Docker in Action teaches listeners how to create, deploy, and manage applications hosted in Docker containers. After an explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: Computer Hacking Mastery
- Auteur(s): Robert Keane
- Narrateur(s): Mike Davis
- Durée: 1 h et 33 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
The world of hacking has changed so much in recent years. New attacks are being made, and learning how to protect your system can be more difficult than ever before. This guidebook has all the information that you need to learn about some of the most common attacks that are going on in the world today, as well as some of the things that you can do to protect yourself. Inside this guidebook, you will learn everything that you need to start your journey with hacking.
-
Hacking: Computer Hacking Mastery
- Narrateur(s): Mike Davis
- Durée: 1 h et 33 min
- Date de publication: 2017-12-20
- Langue: Anglais
-
Inside this guidebook, you will learn everything that you need to start your journey with hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Security Threats
- A Ring of Fire Novel (NESS Series, Book 3)
- Auteur(s): Bjorn Hasseler
- Narrateur(s): P.J. Ochlan
- Durée: 11 h et 16 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Neustatter's European Security Services encounters a campaign of industrial sabotage, a pastor who attempts to limit their client base, an espionage ring, and the aftermath of the Dreeson assassination. Old nemeses and new allies complicate matters. Somewhere in Grantville is a missing heiress. There's also a Resistance, and it has cookies. Even repeat business with established clients is complicated, not to mention dangerous. Real life proves more complicated than Neustatter's movies or Astrid's books as NESS looks for common threads. Which incidents are related and which are not?
-
Security Threats
- A Ring of Fire Novel (NESS Series, Book 3)
- Narrateur(s): P.J. Ochlan
- Série: NESS Series, Livre 3
- Durée: 11 h et 16 min
- Date de publication: 2023-07-18
- Langue: Anglais
-
Neustatter's European Security Services encounters a campaign of industrial sabotage, a pastor who attempts to limit their client base, an espionage ring, and the aftermath of the Dreeson assassination. Old nemeses and new allies complicate matters....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Auteur(s): L.D. Knowings
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Risk Management
- Mastering the Fundamentals Using the NIST Cybersecurity Framework
- Auteur(s): Cynthia Brumfield, Brian Haugli - contributor
- Narrateur(s): Ulf Bjorklund
- Durée: 5 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers an up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers listeners overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks.
-
Cybersecurity Risk Management
- Mastering the Fundamentals Using the NIST Cybersecurity Framework
- Narrateur(s): Ulf Bjorklund
- Durée: 5 h et 55 min
- Date de publication: 2025-09-16
- Langue: Anglais
-
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers an exploration of the fundamentals of cybersecurity risk planning and management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,47 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- Auteur(s): Thomas J. Parenty, Jack J. Domet
- Narrateur(s): Jonathan Todd Ross
- Durée: 5 h et 47 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- Narrateur(s): Jonathan Todd Ross
- Durée: 5 h et 47 min
- Date de publication: 2019-12-03
- Langue: Anglais
-
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Auteur(s): Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What to Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour—from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria—recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes.
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Date de publication: 2023-11-21
- Langue: Anglais
-
A team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Hello Girls
- America’s First Women Soldiers
- Auteur(s): Elizabeth Cobbs
- Narrateur(s): Susan Ericksen
- Durée: 12 h et 3 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
This is the story of how America's first women soldiers helped win World War I, earned the vote, and fought the US Army. In 1918 the US Army Signal Corps sent 223 women to France. They were masters of the latest technology: the telephone switchboard. General John Pershing, commander of the American Expeditionary Forces, demanded female "wire experts" when he discovered that inexperienced doughboys were unable to keep him connected with troops under fire.
-
-
unbelievable yet very believable
- Écrit par SJW2015 le 2019-08-18
-
The Hello Girls
- America’s First Women Soldiers
- Narrateur(s): Susan Ericksen
- Durée: 12 h et 3 min
- Date de publication: 2017-06-27
- Langue: Anglais
- This is the story of how America's first women soldiers helped win World War I, earned the vote, and fought the US Army....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
API Security in Action
- Auteur(s): Neil Madden
- Narrateur(s): Marianne Sheehan
- Durée: 20 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
A web API is an efficient way to communicate with an application or service. However, this convenience opens your systems to new security risks. API Security in Action gives you the skills to build strong, safe APIs you can confidently expose to the world.
-
API Security in Action
- Narrateur(s): Marianne Sheehan
- Durée: 20 h et 5 min
- Date de publication: 2021-07-14
- Langue: Anglais
-
A web API is an efficient way to communicate with an application or service. However, this convenience opens your systems to new security risks. API Security in Action gives you the skills to build strong, safe APIs you can confidently expose to the world...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Implement Artificial Intelligence and Cybersecurity in Modern Businesses
- Basics and Guides for Dummies and Beginners
- Auteur(s): Perry S.
- Narrateur(s): Ben Herold
- Durée: 1 h et 25 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This book is a good guide and provides basics on AI and cybersecurity to beginners and dummies. Also, it is helpful to answer questions of businesses like: How can one implement AI and cybersecurity in a company?, How and when can you link an AI?, and much more.
-
How to Implement Artificial Intelligence and Cybersecurity in Modern Businesses
- Basics and Guides for Dummies and Beginners
- Narrateur(s): Ben Herold
- Durée: 1 h et 25 min
- Date de publication: 2021-04-12
- Langue: Anglais
-
This book is a good guide and provides basics on AI and cybersecurity to beginners and dummies. Also, it is helpful to answer questions of businesses like: How can one implement AI and cybersecurity in a company?, How and when can you link an AI?, and much more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
6,05 $ ou gratuit avec l'essai de 30 jours
-
-
-
Blockchain and the Law
- The Rule of Code
- Auteur(s): Primavera De Filippi, Aaron Wright
- Narrateur(s): Teri Schnaubelt
- Durée: 8 h et 55 min
- Version intégrale
-
Au global4
-
Performance3
-
Histoire3
Blockchain technology could affect governance itself by supporting new organizational structures that promote more democratic and participatory decision making. Primavera De Filippi and Aaron Wright acknowledge this potential and urge the law to catch up. That is because disintermediation - a blockchain's greatest asset - subverts critical regulation. By cutting out middlemen, such as online operators and multinational corporations, blockchains run the risk of undermining the capacity of governmental authorities to supervise activities in banking, commerce, law, and other vital areas.
-
Blockchain and the Law
- The Rule of Code
- Narrateur(s): Teri Schnaubelt
- Durée: 8 h et 55 min
- Date de publication: 2018-08-21
- Langue: Anglais
-
De Filippi and Wright welcome the new possibilities inherent in blockchains. But as Blockchain and the Law makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Auteur(s): Steve Watkins
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022.
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Date de publication: 2023-09-06
- Langue: Anglais
-
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Auteur(s): Anthony Hack
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you. This audiobook includes: SQL Computer Programming for Beginners, Python for Beginners, Kali Linux and Hacking with Kali Linux.
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Date de publication: 2020-09-18
- Langue: Anglais
-
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
There's a War Going On but No One Can See It
- Auteur(s): Huib Modderkolk
- Narrateur(s): Omar Baroud
- Durée: 8 h et 42 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us.
-
There's a War Going On but No One Can See It
- Narrateur(s): Omar Baroud
- Durée: 8 h et 42 min
- Date de publication: 2021-09-02
- Langue: Anglais
-
Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
19,12 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Start a Cybersecurity Consulting Business
- Your Guide to Launching, Managing, and Growing a Cybersecurity Consultancy
- Auteur(s): VentureNest Books
- Narrateur(s): Andy David Jones
- Durée: 2 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In an era where digital threats are ever-present, the need for cybersecurity solutions is at an all-time high. How to Start a Cybersecurity Consulting Business is a crucial resource for those who want to establish a successful consulting firm in this booming industry.
-
How to Start a Cybersecurity Consulting Business
- Your Guide to Launching, Managing, and Growing a Cybersecurity Consultancy
- Narrateur(s): Andy David Jones
- Durée: 2 h et 59 min
- Date de publication: 2025-04-18
- Langue: Anglais
-
In an era where digital threats are ever-present, the need for cybersecurity solutions is at an all-time high. How to Start a Cybersecurity Consulting Business is a crucial resource for those who want to establish a successful consulting firm in this booming industry.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-