Computer Security
-
-
Mastering Online CTFs
- Your Guide to Becoming a Competitor
- Auteur(s): Charles Montago
- Narrateur(s): Matthew Michael Lewis
- Durée: 2 h et 19 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Imagine yourself on a digital battlefield, armed only with your wits and a keyboard. The thrill of outsmarting hackers and navigating complex cybersecurity challenges fuels your adrenaline, pushing you to new heights of knowledge and skill. As you delve deeper into the world of cybersecurity, you’ll discover the immense potential for growth and mastery that awaits you. With each challenge you conquer, you unlock a new level of expertise, honing your abilities to become a formidable force in the digital realm.
-
Mastering Online CTFs
- Your Guide to Becoming a Competitor
- Narrateur(s): Matthew Michael Lewis
- Durée: 2 h et 19 min
- Date de publication: 2024-09-16
- Langue: Anglais
-
Imagine yourself on a digital battlefield, armed only with your wits and a keyboard. The thrill of outsmarting hackers and navigating complex cybersecurity challenges fuels your adrenaline, pushing you to new heights of knowledge and skill.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Auteur(s): Department of Justice FBI NSA Department of State
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Date de publication: 2023-06-21
- Langue: Anglais
-
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Power to the People
- How Open Technological Innovation is Arming Tomorrow's Terrorists
- Auteur(s): Audrey Kurth Cronin
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As Audrey Kurth Cronin explains in Power to the People, what we are seeing now is an exacerbation of an age-old trend. Over the centuries, the most surprising developments in warfare have occurred because of advances in technologies combined with changes in who can use them. Indeed, accessible innovations in destructive force have long driven new patterns of political violence. When Nobel invented dynamite and Kalashnikov designed the AK-47, each inadvertently spurred terrorist and insurgent movements that killed millions and upended the international system.
-
Power to the People
- How Open Technological Innovation is Arming Tomorrow's Terrorists
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 40 min
- Date de publication: 2020-03-10
- Langue: Anglais
-
Never have so many possessed the means to be so lethal. The diffusion of modern technology to ordinary people has given them access to weapons of mass violence previously monopolized by the state....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Black Scorpion Pilot
- A Ford Stevens Military-Aviation Thriller, Volume 2
- Auteur(s): Lawrence A. Colby
- Narrateur(s): Christopher Raab
- Durée: 9 h et 19 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In a hidden base in China, Lieutenant General He Chen licks his wounds. The Devil Dragon project lies in ruins, thanks to the heroics of US Air Force Reserve Captain Ford Stevens and Stevens's best friend, pilot Wu Lee. But now Lee is gone, and as Stevens mourns the loss of his friend, Chen works to complete his second spy plane, codenamed Black Scorpion.
-
The Black Scorpion Pilot
- A Ford Stevens Military-Aviation Thriller, Volume 2
- Narrateur(s): Christopher Raab
- Série: Ford Stevens Military-Aviation Thrillers, Livre 2
- Durée: 9 h et 19 min
- Date de publication: 2019-05-29
- Langue: Anglais
-
In a hidden base in China, Lieutenant General He Chen licks his wounds. The Devil Dragon project lies in ruins, thanks to the heroics of US Air Force Reserve Captain Ford Stevens and Stevens's best friend, pilot Wu Lee....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- Auteur(s): Josephine Wolff
- Narrateur(s): Kate Reading
- Durée: 14 h
- Version intégrale
-
Au global2
-
Performance1
-
Histoire1
Cybersecurity incidents make the news with startling regularity. Each breach makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- Narrateur(s): Kate Reading
- Durée: 14 h
- Date de publication: 2018-11-13
- Langue: Anglais
-
Cybersecurity incidents make the news with startling regularity. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,13 $ ou gratuit avec l'essai de 30 jours
-
-
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Auteur(s): Cybersecurity Bookstore
- Narrateur(s): Will Davidson
- Durée: 2 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security. The book is divided into eight chapters that cover various aspects of IT security and provide practical guidance on how to secure your organization's data and systems.
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Narrateur(s): Will Davidson
- Durée: 2 h
- Date de publication: 2023-10-24
- Langue: Anglais
-
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital Downfall
- Technology, Cyberattacks and the End of the American Republic
- Auteur(s): Hugh Taylor
- Narrateur(s): Robbie Smith
- Durée: 6 h et 45 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Is America on the brink of civil war? Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict? What would happen if the lights went out and the technology we rely upon to run American life is no longer available? The present dangers are real. The US is more vulnerable to destructive foreign interference today than it has been in over a century. As Russia and China realize they can’t win shooting wars against the US, they have devised new and cunning ways to destabilize American politics and cripple the US economy.
-
Digital Downfall
- Technology, Cyberattacks and the End of the American Republic
- Narrateur(s): Robbie Smith
- Durée: 6 h et 45 min
- Date de publication: 2020-08-20
- Langue: Anglais
-
Is America on the brink of civil war? Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict? What would happen if the lights went out and the technology we rely upon to run American life is no longer available? The present dangers are real....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Google Archipelago: The Digital Gulag and the Simulation of Freedom
- Auteur(s): Michael Rectenwald
- Narrateur(s): William Williams
- Durée: 4 h et 56 min
- Version intégrale
-
Au global3
-
Performance1
-
Histoire1
Google Archipelago: The Digital Gulag and the Simulation of Freedom explores the reach, penetration, power, and impact of Big Digital or the mega-information managers, social media platforms, Artificial Intelligence developers, providers of other web applications and functionalities, and the architects and proponents of the promised Internet of Things.
-
Google Archipelago: The Digital Gulag and the Simulation of Freedom
- Narrateur(s): William Williams
- Durée: 4 h et 56 min
- Date de publication: 2019-11-21
- Langue: Anglais
-
Google Archipelago: The Digital Gulag and the Simulation of Freedom explores the reach, penetration, power, and impact of Big Digital or the mega-information managers, social media platforms, Artificial Intelligence developers, providers of other web applications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Secret Empire
- Eisenhower, CIA, and the Hidden Story of America's Space Espionage
- Auteur(s): Philip Taubman
- Narrateur(s): Michael Prichard
- Durée: 15 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
During the early and most dangerous years of the cold war, a handful of Americans, led by President Dwight D. Eisenhower, revolutionized spying and warfare. In great secrecy and beyond the prying eyes of Congress and the press, they built exotic new machines that opened up the Soviet Union to surveillance and protected the United States from surprise nuclear attack. Secret Empire is the dramatic story of these men and their inventions, told in full for the first time.
-
Secret Empire
- Eisenhower, CIA, and the Hidden Story of America's Space Espionage
- Narrateur(s): Michael Prichard
- Durée: 15 h et 40 min
- Date de publication: 2004-02-26
- Langue: Anglais
- During the early and most dangerous years of the cold war, a handful of Americans, led by President Dwight D. Eisenhower, revolutionized spying and warfare....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,05 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Auteur(s): Hans Weber
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how can you safeguard yourself from the different threats? Let’s find out. We will also take a look at the career of a computer networking specialist and the challenges you can expect.
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Date de publication: 2020-06-12
- Langue: Anglais
-
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how to safeguard yourself from the different threats? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Date de publication: 2021-01-14
- Langue: Anglais
-
The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking
- A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing
- Auteur(s): John Slavio
- Narrateur(s): T. W. Ashworth
- Durée: 1 h et 19 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
All you wanted to know about hacking and computer security. This book will teach you everything you need to know about hacking, the history of hacking, the types of hacking, and security measures that you should undertake. This book will teach you about the techniques you can use to prank your friends or spy on your significant other (maybe). It can also get you started on your journey towards being an ethical hacker, which is a fast-growing, in-demand field.
-
Hacking
- A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing
- Narrateur(s): T. W. Ashworth
- Durée: 1 h et 19 min
- Date de publication: 2017-05-11
- Langue: Anglais
- All you wanted to know about hacking and computer security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Certifications for Beginners
- Your Ultimate Guide to Launching a Career in Cybersecurity
- Auteur(s): Taimur Ijlal
- Narrateur(s): Taylor Perkinson
- Durée: 1 h et 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In a rapidly evolving digital landscape, the cybersecurity market is set to skyrocket, reaching an astounding USD 424.97 Billion by 2030. Amidst this growth, certifications stand out as the golden ticket for those eager to penetrate this lucrative field. Yet, with a plethora of options, where does one even begin?
-
Cybersecurity Certifications for Beginners
- Your Ultimate Guide to Launching a Career in Cybersecurity
- Narrateur(s): Taylor Perkinson
- Durée: 1 h et 53 min
- Date de publication: 2023-08-18
- Langue: Anglais
-
In a rapidly evolving digital landscape, the cybersecurity market is set to skyrocket, reaching an astounding USD 424.97 Billion by 2030. Amidst this growth, certifications stand out as the golden ticket for those eager to penetrate this lucrative field....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
AI Security
- Using Machine Learning Techniques to Detect and Counter Cyber Threats
- Auteur(s): Dr. Arley Ballenger
- Narrateur(s): Antoine Paden
- Durée: 33 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
AI Security: Using Machine Learning Techniques to Detect and Counter Cyber Threats focuses on the application of artificial intelligence, particularly machine learning, to enhance cybersecurity. The book is divided into several sections that cover various aspects of AI security.
-
AI Security
- Using Machine Learning Techniques to Detect and Counter Cyber Threats
- Narrateur(s): Antoine Paden
- Durée: 33 min
- Date de publication: 2025-06-09
- Langue: Anglais
-
AI Security: Using Machine Learning Techniques to Detect and Counter Cyber Threats focuses on the application of artificial intelligence, particularly machine learning, to enhance cybersecurity. The book is divided into several sections that cover various aspects of AI security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- Auteur(s): Kimberly Burk Cordova
- Narrateur(s): Hannah Stone
- Durée: 3 h et 15 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cybersecurity for Entrepreneurs is your essential guide to understanding and defending your business from the ever-evolving landscape of online threats. Written specifically for small business owners and entrepreneurs, this book simplifies complex cybersecurity concepts and equips you with practical strategies to safeguard your operations, data, and reputation.
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- Narrateur(s): Hannah Stone
- Durée: 3 h et 15 min
- Date de publication: 2024-07-10
- Langue: Anglais
-
Cybersecurity for Entrepreneurs is your essential guide to understanding and defending your business from the ever-evolving landscape of online threats.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Baofeng Radio Toolkit
- From Novice to Expert in 7 Days (Self Sufficient Living, Book 12)
- Auteur(s): Bradley Stone
- Narrateur(s): Kayll Heath
- Durée: 3 h et 27 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Packed with comprehensive lessons, step-by-step advice, and hands-on knowledge, this ultimate guerrilla guide to your BaoFeng radio demystifies the world of radio operation, arming you with combat-proven tactics for utilizing your BaoFeng radio to its fullest.
-
Baofeng Radio Toolkit
- From Novice to Expert in 7 Days (Self Sufficient Living, Book 12)
- Narrateur(s): Kayll Heath
- Durée: 3 h et 27 min
- Date de publication: 2025-01-28
- Langue: Anglais
-
Packed with comprehensive lessons, step-by-step advice, and hands-on knowledge, this ultimate guerrilla guide to your BaoFeng radio demystifies the world of radio operation, arming you with combat-proven tactics for utilizing your BaoFeng radio to its fullest.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Seniors Made Easy
- Simple Steps to Protect Your Identity, Avoid Money Scams, and Enjoy Peace of Mind Every Time You Go Online
- Auteur(s): Alex East
- Narrateur(s): Alex East
- Durée: 3 h et 24 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Discover how effortless it can be to safeguard your privacy online! It’s never too late to take control of your safety! This book is specifically designed for seniors like you, making online security easy and accessible at any age. We break everything down into simple, everyday language with step-by-step instructions. Protecting your personal information is one of the most important things you can do—at any stage of life and with no technical expertise required!
-
Cybersecurity for Seniors Made Easy
- Simple Steps to Protect Your Identity, Avoid Money Scams, and Enjoy Peace of Mind Every Time You Go Online
- Narrateur(s): Alex East
- Durée: 3 h et 24 min
- Date de publication: 2024-11-20
- Langue: Anglais
-
Discover how effortless it can be to safeguard your privacy online! It’s never too late to take control of your safety! This book is specifically designed for seniors like you, making online security easy and accessible at any age.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hack Proof
- A Guide to Cybersecurity for Your Business
- Auteur(s): Sergey Poltev
- Narrateur(s): Ethan Walsh
- Durée: 3 h et 47 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
You need to understand what’s come before so that you can guard against it happening to you… and you need to know exactly what to do to make sure your business is secure. You also need to understand exactly what your cybersecurity status is right now so you can pinpoint the holes that need patching… and the chances are, there’s more to patch up than you realize. Because here’s the kicker: Technology is vital to the success of your company – and that means you have to keep it safe.
-
-
Technology
- Écrit par Joseph Mendoza le 2024-08-12
-
Hack Proof
- A Guide to Cybersecurity for Your Business
- Narrateur(s): Ethan Walsh
- Durée: 3 h et 47 min
- Date de publication: 2024-07-26
- Langue: Anglais
-
You need to understand what’s come before so that you can guard against it happening to you… and you need to know exactly what to do to make sure your business is secure.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Sentinel Squad
- In the Shadows of a Cyber Hacker
- Auteur(s): Robert L Cogmon, Robert L. Cogmon
- Narrateur(s): Dalan Decker
- Durée: 2 h et 46 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Digital Heroism: Cyber security experts are portrayed in the manuscript as contemporary heroes who bravely, shrewdly, and strategically defeat cyberattacks. Characters such as Deja Digital serve as examples of the value of technical know-how and inventiveness in building defenses against cyberattacks.
-
The Sentinel Squad
- In the Shadows of a Cyber Hacker
- Narrateur(s): Dalan Decker
- Durée: 2 h et 46 min
- Date de publication: 2024-05-29
- Langue: Anglais
-
Digital Heroism: Cyber security experts are portrayed in the manuscript as contemporary heroes who bravely, shrewdly, and strategically defeat cyberattacks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Art of Cybersecurity Self-Defense
- A Beginner's Guide to Online Safety and Privacy: Lockdown, Ensuring Online Privacy in a Connected World
- Auteur(s): Shawni Marie
- Narrateur(s): Melissa-Marie Shriner
- Durée: 3 h et 26 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
An age where the digital landscape is both our playground and our battleground, protecting our online security and privacy has never been more critical. "The Art of Cybersecurity Self-Defense: A Beginner's Guide to Online Safety and Privacy" is your indispensable guide to mastering the art of cybersecurity, fortifying your online safety, and safeguarding your most precious asset—your personal information.
-
The Art of Cybersecurity Self-Defense
- A Beginner's Guide to Online Safety and Privacy: Lockdown, Ensuring Online Privacy in a Connected World
- Narrateur(s): Melissa-Marie Shriner
- Durée: 3 h et 26 min
- Date de publication: 2024-01-29
- Langue: Anglais
-
An age where the digital landscape is both our playground and our battleground, protecting our online security and privacy has never been more critical....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-