Computer Security
-
-
Cybersecurity for Beginners
- How to Manage Risk, Using the NIST Cybersecurity Framework
- Auteur(s): John Knowles
- Narrateur(s): Scott Clem
- Durée: 5 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Learn what it takes to manage risk in your organization, specifically risk that has to do with information with information systems, with data, and much more.
-
Cybersecurity for Beginners
- How to Manage Risk, Using the NIST Cybersecurity Framework
- Narrateur(s): Scott Clem
- Durée: 5 h et 27 min
- Date de publication: 2020-12-14
- Langue: Anglais
-
Learn what it takes to manage risk in your organization, specifically risk that has to do with information with information systems, with data, and much more.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hijacked by Hackers
- Be Afraid. Be Very, Very Afraid.
- Auteur(s): Michael Klein
- Narrateur(s): Ken Maxon
- Durée: 4 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks and tools of the trade used to entice or frighten people into following their lead. You'll hear stories of cyber criminals who went legit, creating quite the stir in corporations like Google and Microsoft. You'll also be introduced to hackers who have threatened our national security and compromised global systems to reveal their secrets.
-
Hijacked by Hackers
- Be Afraid. Be Very, Very Afraid.
- Narrateur(s): Ken Maxon
- Durée: 4 h et 6 min
- Date de publication: 2016-10-28
- Langue: Anglais
- Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyberdeterrence and Cyberwar
- Auteur(s): Martin C. Libicki
- Narrateur(s): Erik Sandvold
- Durée: 6 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The protection of cyberspace has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information for money or to disrupt operations. Future wars are likely to be carried out, in part or perhaps entirely, in cyberspace. It might therefore seem obvious that maneuvering in cyberspace is like maneuvering in other media, but nothing would be more misleading. Cyberspace has its own laws.
-
Cyberdeterrence and Cyberwar
- Narrateur(s): Erik Sandvold
- Durée: 6 h et 8 min
- Date de publication: 2010-11-18
- Langue: Anglais
- The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
16,32 $ ou gratuit avec l'essai de 30 jours
-
-
-
Obfuscation
- A User's Guide for Privacy and Protest
- Auteur(s): Finn Brunton, Helen Nissenbaum
- Narrateur(s): Dana Hickox
- Durée: 4 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance - the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy-protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data-collection projects.
-
Obfuscation
- A User's Guide for Privacy and Protest
- Narrateur(s): Dana Hickox
- Durée: 4 h et 21 min
- Date de publication: 2015-12-07
- Langue: Anglais
- Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Securing AI in Finance, Volume 1
- Strategies for the Latin American Market
- Auteur(s): Avi Pilcer
- Narrateur(s): Avi Pilcer
- Durée: 2 h et 54 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Your AI systems handle millions in transactions daily. Are they truly secure? This essential guide reveals how Latin American financial institutions are protecting their AI infrastructure against emerging threats — from quantum attacks to model manipulation. Written for decision-makers who need to understand both the threats and solutions in our rapidly evolving financial landscape. Discover proven frameworks for securing AI systems while maintaining competitive advantage in one of the world's most dynamic banking markets.
-
Securing AI in Finance, Volume 1
- Strategies for the Latin American Market
- Narrateur(s): Avi Pilcer
- Durée: 2 h et 54 min
- Date de publication: 2025-03-27
- Langue: Anglais
-
Your AI systems handle millions in transactions daily. Are they truly secure? This essential guide reveals how Latin American financial institutions are protecting their AI infrastructure against emerging threats — from quantum attacks to model manipulation.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Checklist for Business Owners
- Executive Battle Plan to Survive Cyber Threats
- Auteur(s): William Alexander Clements
- Narrateur(s): Jon Wilkins
- Durée: 2 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybercriminals never rest—and small businesses are their preferred targets. Many business owners assume they're too small to attract hackers or trust that their IT provider has everything covered. But assumptions like these put your business at severe risk.
-
Cybersecurity Checklist for Business Owners
- Executive Battle Plan to Survive Cyber Threats
- Narrateur(s): Jon Wilkins
- Durée: 2 h et 8 min
- Date de publication: 2025-07-01
- Langue: Anglais
-
Cybercriminals never rest—and small businesses are their preferred targets. Many business owners assume they're too small to attract hackers or trust that their IT provider has everything covered. But assumptions like these put your business at severe risk.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
NIST CSF 2.0
- Your Essential Introduction to Managing Cybersecurity Risks
- Auteur(s): Andrew Pattison
- Narrateur(s): Kerry Hutchinson
- Durée: 2 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organize their critical activities and ensure they remain up to date, Version 2.0 states that “The CSF is designed to be used by organizations of all sizes and sectors, including industry, government, academia, and nonprofit organizations, regardless of the maturity level of their cybersecurity programs.”
-
NIST CSF 2.0
- Your Essential Introduction to Managing Cybersecurity Risks
- Narrateur(s): Kerry Hutchinson
- Durée: 2 h et 7 min
- Date de publication: 2025-05-30
- Langue: Anglais
-
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Technocreep
- The Surrender of Privacy and the Capitalization of Intimacy
- Auteur(s): Thomas P. Keenan
- Narrateur(s): Thomas P. Keenan
- Durée: 9 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With security scares like the Heartbleed bug (which compromised even supposedly safe internet behemoths like Google and Yahoo!) becoming more commonplace, this book is a must-listen for anybody who values their privacy in a wired world.
-
-
beautiful and scary story about technology
- Écrit par Nataliya le 2023-01-05
-
Technocreep
- The Surrender of Privacy and the Capitalization of Intimacy
- Narrateur(s): Thomas P. Keenan
- Durée: 9 h et 31 min
- Date de publication: 2014-10-14
- Langue: Anglais
- Here is the definitive dissection of privacy-eroding and life-invading technologies, coming at you from governments, corporations, and the person next door....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
More Awesome Than Money
- Four Boys and Their Heroic Quest to Save Your Privacy from Facebook
- Auteur(s): Jim Dwyer
- Narrateur(s): Pete Larkin
- Durée: 12 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Their idea was simple. Four NYU undergrads wanted to build a social network that would allow users to control their personal data instead of surrendering it to big businesses like Facebook. They called it Diaspora. In days they raised $200,000, and reporters, venture capitalists, and the digital community's most legendary figures were soon monitoring their progress. But as the months passed and the money ran out, the Diaspora Four fell victim to errors, bad decisions, and their own hubris.
-
More Awesome Than Money
- Four Boys and Their Heroic Quest to Save Your Privacy from Facebook
- Narrateur(s): Pete Larkin
- Durée: 12 h et 22 min
- Date de publication: 2014-10-16
- Langue: Anglais
- Their idea was simple. Four NYU undergrads wanted to build a social network that would allow users to control their personal data instead of surrendering it to big businesses....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
Superintelligence on the Horizon
- Steering the Course of Cybersecurity
- Auteur(s): Felipe Chavarro Polanía
- Narrateur(s): Robert Simons
- Durée: 3 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As we stand at the precipice of an era marked by unprecedented technological advancement, the emergence of superintelligent AI systems heralds both transformative opportunities and profound risks for the future of humanity. In Superintelligence on the Horizon: Navigating the Future of AI Governance and Cybersecurity, Felipe Chavarro Polanía offers a comprehensive and thought-provoking exploration of the complex challenges and possibilities that lie ahead.
-
Superintelligence on the Horizon
- Steering the Course of Cybersecurity
- Narrateur(s): Robert Simons
- Durée: 3 h et 31 min
- Date de publication: 2025-03-14
- Langue: Anglais
-
In Superintelligence on the Horizon: Navigating the Future of AI Governance and Cybersecurity, Felipe Chavarro Polanía offers a comprehensive and thought-provoking exploration of the complex challenges and possibilities that lie ahead.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Warriors
- Developing the Future of Cyber Professionals
- Auteur(s): Dr. Ray Malmassari
- Narrateur(s): Josh Adams
- Durée: 2 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber Warriors: Developing the Future of Cyber Professionals is a compelling and practical guide designed to inspire and empower the next generation of cybersecurity leaders. Drawing from over 15 years of professional experience and research, Dr. Malmassari provides invaluable insights into the evolving cybersecurity landscape. This book explores critical themes such as leadership support, fostering a strong security culture, continuous learning, and the strategies needed to succeed in an increasingly digital world.
-
Cyber Warriors
- Developing the Future of Cyber Professionals
- Narrateur(s): Josh Adams
- Durée: 2 h et 9 min
- Date de publication: 2025-03-10
- Langue: Anglais
-
Cyber Warriors: Developing the Future of Cyber Professionals is a compelling and practical guide designed to inspire and empower the next generation of cybersecurity leaders.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Ultimate Cyber Security Guide for TikTok Everyday Users, Influencers and Content Creators
- The First Ever Guide Dedicated to Protecting Your Presence and Privacy on TikTok
- Auteur(s): WeCyberYou!
- Narrateur(s): AJ Collins
- Durée: 1 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook is for you. It has been narrated specially for all TikTok Everyday Users, Influencers and Content Creators around the world. We’ll show you how you can make the most of TikTok – safely and securely! You’ll find the knowledge and guidance you need to protect your TikTok account effectively.
-
The Ultimate Cyber Security Guide for TikTok Everyday Users, Influencers and Content Creators
- The First Ever Guide Dedicated to Protecting Your Presence and Privacy on TikTok
- Narrateur(s): AJ Collins
- Durée: 1 h et 35 min
- Date de publication: 2025-06-11
- Langue: Anglais
-
This audiobook is for you. It has been narrated specially for all TikTok Everyday Users, Influencers and Content Creators around the world. We’ll show you how you can make the most of TikTok – safely and securely!
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,10 $ ou gratuit avec l'essai de 30 jours
-
-
-
America the Vulnerable
- Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
- Auteur(s): Joel Brenner
- Narrateur(s): Lloyd James
- Durée: 9 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.
-
America the Vulnerable
- Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
- Narrateur(s): Lloyd James
- Durée: 9 h et 55 min
- Date de publication: 2011-10-05
- Langue: Anglais
- A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital Life Skills for Youth
- A Guide for Parents, Guardians, and Educators (Reference Series)
- Auteur(s): Angela Crocker
- Narrateur(s): Peter Williams
- Durée: 4 h et 57 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Raising, teaching, and guiding kids is a tough job. They need to be taught basic skills such as how to cross the road, boil water, and read in order to get by in life. To make things tougher, these days, tweens and teens also need to be taught digital life skills. But in this digital age, how do you protect kids on the internet? Today’s youth have access to more technology and information than any previous generation.
-
Digital Life Skills for Youth
- A Guide for Parents, Guardians, and Educators (Reference Series)
- Narrateur(s): Peter Williams
- Durée: 4 h et 57 min
- Date de publication: 2020-10-20
- Langue: Anglais
-
Raising, teaching, and guiding kids is a tough job. They need to be taught basic skills such as how to cross the road, boil water, and read in order to get by in life. To make things tougher, these days, tweens and teens also need to be taught digital life skills....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Insider Secrets to Internet Safety
- Advice from a Professional Hacker
- Auteur(s): Terry Cutler
- Narrateur(s): Kaleo Griffith
- Durée: 4 h et 10 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In a world of digital technology, it’s easy to forget one sobering fact: Our identity can be stolen from under our noses, with one click of the mouse, propelling us into nightmares in a matter of minutes, anytime, anywhere, and on any one of our darling gadgets. Cybercrimes, malware, botnets, and all forms of digital threats are ever more sophisticated, waiting in the shadows for that one opportunity to steal your sensitive information.
-
Insider Secrets to Internet Safety
- Advice from a Professional Hacker
- Narrateur(s): Kaleo Griffith
- Durée: 4 h et 10 min
- Date de publication: 2020-07-21
- Langue: Anglais
-
In a world of digital technology, it’s easy to forget one sobering fact: Our identity can be stolen from under our noses, with one click of the mouse, propelling us into nightmares in a matter of minutes, anytime, anywhere, and on any one of our darling gadgets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Beginners: 3 Books in 1
- What You Must Know About Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
- Auteur(s): Attila Kovacs
- Narrateur(s): Matyas J
- Durée: 5 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this audiobook you will learn: What types of roles exist in the field of Cybersecurity, what key concepts and methodologies you must learn in Cybersecurity, what are the key technologies that you should be aware, how to get started in the field of Cybersecurity, what kind of Cybersecurity entry level salary you can expect, how to overcome obstructions and get things done, how to become a project oriented security professional, what kind of mindset you must have in Cybersecurity, how to express your unique voice in Cybersecurity, and much more!
-
Cybersecurity for Beginners: 3 Books in 1
- What You Must Know About Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
- Narrateur(s): Matyas J
- Série: Cybersecurity for Beginners
- Durée: 5 h et 47 min
- Date de publication: 2020-04-10
- Langue: Anglais
-
In this audiobook you will learn: What types of roles exist in the field of Cybersecurity, what key concepts and methodologies you must learn in Cybersecurity, what are the key technologies that you should be aware, how to get started in the field of Cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Your Safety and Privacy Online: The CIA and NSA
- Auteur(s): Siggi Bjarnason
- Narrateur(s): Becky White
- Durée: 4 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them. My goal is to explain online threats in terms that don't require a technical background to understand. All techno-speak will be limited, and where it cannot be avoided, I will first explain them in common, non-technical terms.
-
Your Safety and Privacy Online: The CIA and NSA
- Narrateur(s): Becky White
- Durée: 4 h et 27 min
- Date de publication: 2019-11-22
- Langue: Anglais
-
The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Machine Learning: Your Ultimate Guide on Machine Learning, Agile Project Management, and Hacking
- A Three-Book Bundle
- Auteur(s): Robert Keane
- Narrateur(s): Mike Davis
- Durée: 4 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Your ultimate guide on machine learning, agile project management, and hacking. This audiobook includes three manuscripts! Machine learning, agile project management, and hacking are vital to the world of information technology and have changed drastically in recent years. This guidebook has all the information that you need to learn about some of the most common applications and attacks in the world today as well as some of the things that you can do to protect and educate yourself.
-
Machine Learning: Your Ultimate Guide on Machine Learning, Agile Project Management, and Hacking
- A Three-Book Bundle
- Narrateur(s): Mike Davis
- Durée: 4 h et 27 min
- Date de publication: 2018-01-16
- Langue: Anglais
-
Your ultimate guide on machine learning, agile project management, and hacking. This audiobook includes three manuscripts....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Audacity to Spy
- How Government, Business, and Hackers Rob Us of Privacy
- Auteur(s): Catherine Nolan, Ashley M. Wilson JD
- Narrateur(s): Randal Schaffer
- Durée: 4 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources.
-
The Audacity to Spy
- How Government, Business, and Hackers Rob Us of Privacy
- Narrateur(s): Randal Schaffer
- Durée: 4 h et 14 min
- Date de publication: 2016-08-11
- Langue: Anglais
- The Audacity to Spy reveals the ways in which your identity and personal data have been stolen by various sources....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Safe Computing Is Like Safe Sex: You Have to Practice It to Avoid Infection
- Auteur(s): Richard Lowe Jr.
- Narrateur(s): Sheila Stasack
- Durée: 4 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Protect your computer and your valuable information and photos without breaking your budget or hiring an expert. What if a few new habits could dramatically reduce the chances of your system being infected with a virus or attacked by a hacker? Imagine surfing the web without worrying about the terrors of credit card fraud or identity theft. What if you could keep the bad guys away with a few simple applications?
-
Safe Computing Is Like Safe Sex: You Have to Practice It to Avoid Infection
- Narrateur(s): Sheila Stasack
- Durée: 4 h et 51 min
- Date de publication: 2016-03-23
- Langue: Anglais
- Protect your computer and your valuable information and photos without breaking your budget or hiring an expert....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-