Computer Security
-
-
The Cybersecurity Blueprint for Executives
- A No-Nonsense Guide to What To Do When Attacked, How To Mitigate Risk, and Make Smarter Business Decisions To Enhance Your Leadership Impact
- Auteur(s): Marco Ryan, Andrew Fitzmaurice
- Narrateur(s): James Moors
- Durée: 9 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
"The Cybersecurity Blueprint for Executives" transforms complex cyber challenges into clear, actionable strategies for business leaders. Authors Marco Ryan and Andrew Fitzmaurice draw upon their expertise across government, academia, and business to provide answers you need.
-
The Cybersecurity Blueprint for Executives
- A No-Nonsense Guide to What To Do When Attacked, How To Mitigate Risk, and Make Smarter Business Decisions To Enhance Your Leadership Impact
- Narrateur(s): James Moors
- Durée: 9 h et 8 min
- Date de publication: 2024-11-11
- Langue: Anglais
-
"The Cybersecurity Blueprint for Executives" transforms complex cyber challenges into clear, actionable strategies for business leaders. Authors Marco Ryan and Andrew Fitzmaurice draw upon their expertise across government, academia, and business to provide answers you need.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Asking the Right Questions
- A Guide to Critical OT Cybersecurity
- Auteur(s): Chukwudi Abalogu
- Narrateur(s): B Fike
- Durée: 4 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The journey towards robust OT cybersecurity is not a destination but a continuous evolution. As technology advances and threat actors become more sophisticated, the need for vigilance and adaptation remains paramount. This book has provided a framework—a set of guiding principles and actionable strategies—for building a resilient cybersecurity posture. However, the true measure of success lies not in the implementation of specific technologies or policies but in the cultivation of a security-conscious culture.
-
Asking the Right Questions
- A Guide to Critical OT Cybersecurity
- Narrateur(s): B Fike
- Durée: 4 h et 4 min
- Date de publication: 2025-03-20
- Langue: Anglais
-
The journey towards robust OT cybersecurity is not a destination but a continuous evolution. As technology advances and threat actors become more sophisticated, the need for vigilance and adaptation remains paramount.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
DeFi and the Future of Finance
- Auteur(s): Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
- Narrateur(s): David de Vries
- Durée: 3 h et 54 min
- Version intégrale
-
Au global13
-
Performance10
-
Histoire10
During the Global Financial Crisis in 2008, our financial infrastructure failed. Governments bailed out the very institutions that let the economy down. This episode spurred a serious rethink of our financial system. In DeFi and the Future of Finance, Campbell R. Harvey, Ashwin Ramachandran, and Joey Santoro introduce the new world of decentralized finance. The book argues that the current financial landscape is ripe for disruption and we are seeing, in real time, the reinvention of finance.
-
-
Horrible. Boring. Uninformative
- Écrit par Kasper Christensen le 2022-01-04
-
DeFi and the Future of Finance
- Narrateur(s): David de Vries
- Durée: 3 h et 54 min
- Date de publication: 2021-09-21
- Langue: Anglais
-
During the Global Financial Crisis in 2008, our financial infrastructure failed. Governments bailed out the very institutions that let the economy down. This episode spurred a serious rethink of our financial system....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,81 $ ou gratuit avec l'essai de 30 jours
-
-
-
Essential Security + Exam Guide: For the CompTIA SY0-701 Exam
- Auteur(s): Phil Martin
- Narrateur(s): Phil Martin
- Durée: 19 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The CompTIA Security+ certification provides a foundational understanding of cybersecurity principles and practices, covering the essential knowledge and skills needed to secure networks, systems, and data. The certification is vendor-neutral and is often recommended as an entry-level credential for IT security professionals.
-
Essential Security + Exam Guide: For the CompTIA SY0-701 Exam
- Narrateur(s): Phil Martin
- Durée: 19 h et 8 min
- Date de publication: 2025-11-25
- Langue: Anglais
-
The CompTIA Security+ certification provides a foundational understanding of cybersecurity principles and practices, covering the essential knowledge and skills needed to secure networks, systems, and data.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,27 $ ou gratuit avec l'essai de 30 jours
-
-
-
ISO 9001:2015
- A Pocket Guide
- Auteur(s): Steve Watkins, Nick Orchiston
- Narrateur(s): Andy Cresswell
- Durée: 1 h et 11 min
- Version intégrale
-
Au global3
-
Performance1
-
Histoire1
Currently used by more than 1.1 million organizations worldwide, the international standard ISO 9001:2015 is the world’s most established quality framework. ISO 9001:2015 - A Pocket Guide is a handy reference audiobook that provides an overview of the ISO 9001 quality management standard.
-
ISO 9001:2015
- A Pocket Guide
- Narrateur(s): Andy Cresswell
- Durée: 1 h et 11 min
- Date de publication: 2018-12-04
- Langue: Anglais
-
Currently used by more than 1.1 million organizations worldwide, the international standard ISO 9001:2015 is the world’s most established quality framework. This is a handy reference audiobook that provides an overview of the ISO 9001 quality management standard....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Auteur(s): Andy Greenberg
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Date de publication: 2012-09-17
- Langue: Anglais
- The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ransom War
- How Cyber Crime Became a Threat to National Security
- Auteur(s): Max Smeets
- Narrateur(s): Walter Dixon
- Durée: 6 h et 24 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This timely book explores the alarming rise of ransomware: malicious software blocking users from their systems or data until they've paid money to regain access or to prevent the release of sensitive information. High-profile British examples of the twenty-first century have targeted national libraries and healthcare organizations; in the US, hackers of Pennsylvania's Lehigh Valley Health Network held patient data hostage—when their demands went unmet, they published topless photographs of women with breast cancer.
-
Ransom War
- How Cyber Crime Became a Threat to National Security
- Narrateur(s): Walter Dixon
- Durée: 6 h et 24 min
- Date de publication: 2025-05-27
- Langue: Anglais
-
This timely book explores the alarming rise of ransomware: malicious software blocking users from their systems or data until they've paid money to regain access or to prevent the release of sensitive information.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
CC Certified in Cybersecurity
- The Complete ISC2 Certification Study Guide
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 2 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification. Navigating through fundamental concepts and advanced techniques, this book serves as a trusted companion for those seeking to master the intricate landscape of cybersecurity.
-
CC Certified in Cybersecurity
- The Complete ISC2 Certification Study Guide
- Narrateur(s): Tom Brooks
- Durée: 5 h et 2 min
- Date de publication: 2024-04-09
- Langue: Anglais
-
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
There's No Such Thing as Crypto Crime
- An Investigative Handbook
- Auteur(s): Nick Furneaux
- Narrateur(s): Mitch Crawford
- Durée: 20 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains. The book explores the criminal opportunities available to malicious actors in the crypto universe, as well as the investigative principles common to this realm.
-
There's No Such Thing as Crypto Crime
- An Investigative Handbook
- Narrateur(s): Mitch Crawford
- Durée: 20 h et 29 min
- Date de publication: 2024-12-31
- Langue: Anglais
-
Accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Inside Cyber
- How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security
- Auteur(s): Chuck Brooks
- Narrateur(s): Ray Greenley
- Durée: 6 h et 27 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security emerges as a critical roadmap for understanding and leveraging the next wave of tech advancements. Chuck Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.
-
Inside Cyber
- How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security
- Narrateur(s): Ray Greenley
- Durée: 6 h et 27 min
- Date de publication: 2024-10-29
- Langue: Anglais
-
Chuck Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- Auteur(s): Jake T. Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 1 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies. Each question is accompanied by detailed explanations and insights into the reasoning behind the correct answers, helping you grasp the underlying concepts thoroughly.
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 1 min
- Date de publication: 2023-12-13
- Langue: Anglais
-
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Developer's Playbook for Large Language Model Security
- Building Secure AI Applications
- Auteur(s): Steve Wilson
- Narrateur(s): Jonathan Yen
- Durée: 8 h et 27 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models.
-
The Developer's Playbook for Large Language Model Security
- Building Secure AI Applications
- Narrateur(s): Jonathan Yen
- Durée: 8 h et 27 min
- Date de publication: 2025-05-13
- Langue: Anglais
-
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Auteur(s): Norman Laurence
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Date de publication: 2020-10-21
- Langue: Anglais
-
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital Sovereignty
- Protecting Your Crypto Assets Against Common Threats
- Auteur(s): Josh McIntyre
- Narrateur(s): Josh McIntyre
- Durée: 4 h et 3 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
For users of crypto assets such as Bitcoin, Ethereum, Litecoin, and others, security can be a challenging topic. There are many pitfalls to securing digital currencies, from managing exchange accounts, protecting self-custody wallets, and navigating social engineering scams. This book teaches users how to protect their crypto assets from common threats. Split into four parts, it covers wallet technology basics, custodial account security, self-custody key protection, and awareness of attacks that users may face.
-
Digital Sovereignty
- Protecting Your Crypto Assets Against Common Threats
- Narrateur(s): Josh McIntyre
- Durée: 4 h et 3 min
- Date de publication: 2026-01-27
- Langue: Anglais
-
For users of crypto assets such as Bitcoin, Ethereum, Litecoin, and others, security can be a challenging topic. There are many pitfalls to securing digital currencies, from managing exchange accounts, protecting self-custody wallets, and navigating social engineering scams.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Fundamentals
- Governance Risk & Compliance (GRC) (Cybersecurity Beginner, Book 2)
- Auteur(s): Bruce Brown
- Narrateur(s): Kevin Howard
- Durée: 3 h et 16 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Discover the Secrets of Cybersecurity Governance, Risk, and Compliance with Cybersecurity Fundamentals: Governance, Risk & Compliance by Bruce Brown, CISSP, CGRC. In the ever-evolving world of cybersecurity, understanding the intricacies of Governance, Risk, and Compliance (GRC) is not just beneficial—it's essential. Despite being one of the most crucial areas in cybersecurity, GRC is often overlooked, leaving many professionals unprepared for the challenges ahead. This book changes that narrative.
-
Cybersecurity Fundamentals
- Governance Risk & Compliance (GRC) (Cybersecurity Beginner, Book 2)
- Narrateur(s): Kevin Howard
- Série: Cybersecurity Beginner, Livre 2
- Durée: 3 h et 16 min
- Date de publication: 2024-10-03
- Langue: Anglais
-
Discover the Secrets of Cybersecurity Governance, Risk, and Compliance with Cybersecurity Fundamentals: Governance, Risk & Compliance by Bruce Brown, CISSP, CGRC.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Lights Out
- A Cyberattack, A Nation Unprepared, Surviving the Aftermath
- Auteur(s): Ted Koppel
- Narrateur(s): Ted Koppel
- Durée: 8 h et 10 min
- Version intégrale
-
Au global9
-
Performance7
-
Histoire7
NEW YORK TIMES BESTSELLER Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared. “Fascinating, frightening, and beyond timely.”—Anderson Cooper Imagine a...
-
-
Beautifully read... ASTOUNDINGLY RESEARCHED!!!!!
- Écrit par Q le 2019-03-15
-
Lights Out
- A Cyberattack, A Nation Unprepared, Surviving the Aftermath
- Narrateur(s): Ted Koppel
- Durée: 8 h et 10 min
- Date de publication: 2015-10-27
- Langue: Anglais
- NEW YORK TIMES BESTSELLER Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared. “Fascinating, frightening, and beyond timely.”—Anderson Cooper Imagine a...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cypherpunks
- Freedom and the Future of the Internet
- Auteur(s): Julian Assange
- Narrateur(s): Tom Pile
- Durée: 4 h et 13 min
- Version intégrale
-
Au global5
-
Performance4
-
Histoire4
Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s. Now, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us.
-
-
A Prerequisite for Living a Dignified Life in the Modern World
- Écrit par Dustin le 2024-05-28
-
Cypherpunks
- Freedom and the Future of the Internet
- Narrateur(s): Tom Pile
- Durée: 4 h et 13 min
- Date de publication: 2013-06-10
- Langue: Anglais
- Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,50 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Vulnerable System
- The History of Information Security in the Computer Age
- Auteur(s): Andrew J. Stewart
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
A Vulnerable System
- The History of Information Security in the Computer Age
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Date de publication: 2021-09-14
- Langue: Anglais
-
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Defend Your Data: Cybersecurity Essentials for Everyone
- Practical Steps to Protect Your Digital Life and Safeguard Your Data
- Auteur(s): Ousmane Barry
- Narrateur(s): Snake Porter
- Durée: 3 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Defend Your Data is a practical guide for anyone who wants to feel more confident and secure in the digital world. It walks you through the threats most people face today, why they work, and how to defend yourself with simple habits that make a real difference. You’ll learn how phishing, malware, ransomware, and social-engineering attacks actually unfold, and what steps you can take to protect your devices, accounts, home network, and personal information. The book breaks down complex ideas in a way that feels approachable, even if you don’t work in technology.
-
Defend Your Data: Cybersecurity Essentials for Everyone
- Practical Steps to Protect Your Digital Life and Safeguard Your Data
- Narrateur(s): Snake Porter
- Durée: 3 h et 59 min
- Date de publication: 2026-01-05
- Langue: Anglais
-
Defend Your Data is a practical guide for anyone who wants to feel more confident and secure in the digital world. It walks you through the threats most people face today, why they work, and how to defend yourself with simple habits that make a real difference.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Rule of Thoughts (Mortality Doctrine, Book Two)
- Auteur(s): James Dashner
- Narrateur(s): Erik Davies
- Durée: 10 h et 11 min
- Version intégrale
-
Au global8
-
Performance8
-
Histoire8
From James Dashner, author of the #1 New York Times bestselling MAZE RUNNER series, comes the second book in the bestselling Mortality Doctrine series, an edge-of-your-seat cyber-adventure trilogy that includes The Eye of Minds and The Game of Lives. Includes a sneak peek of The Fever Code...
-
The Rule of Thoughts (Mortality Doctrine, Book Two)
- Narrateur(s): Erik Davies
- Série: Mortality Doctrine, Livre 2
- Durée: 10 h et 11 min
- Date de publication: 2014-08-26
- Langue: Anglais
- From James Dashner, author of the #1 New York Times bestselling MAZE RUNNER series, comes the second book in the bestselling Mortality Doctrine series, an edge-of-your-seat cyber-adventure trilogy that includes The Eye of Minds and The Game of Lives. Includes a sneak peek of The Fever Code...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,97 $ ou gratuit avec l'essai de 30 jours
-