Computer Security
-
-
FBI Flash: May 2021
- Conti Ransomware Attacks Impact Healthcare and First Responder Networks
- Auteur(s): Federal Bureau of Investigation
- Narrateur(s): Tom Brooks
- Durée: 1 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The following information is being provided by the FBI, with no guarantees or warranties, for potential use at the sole discretion of recipients in order to protect against cyber threats. This data is provided to help cybersecurity professionals and system administrators guard against the persistent malicious actions of cyber actors.
-
FBI Flash: May 2021
- Conti Ransomware Attacks Impact Healthcare and First Responder Networks
- Narrateur(s): Tom Brooks
- Durée: 1 h et 3 min
- Date de publication: 2021-07-15
- Langue: Anglais
-
The following information is being provided by the FBI, with no guarantees or warranties, for potential use at the sole discretion of recipients in order to protect against cyber threats....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Warfare in 2022
- Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates
- Auteur(s): Michael A. Goedeker MSc
- Narrateur(s): Mandy Grant-Grierson
- Durée: 3 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It’s 2022. Do you know if your online information is safe? According to a study by the University of Maryland, hackers attack internet-connected computers every 39 seconds. The same technology that’s made information sharing easier has put our privacy at risk more than ever. But it doesn’t stop there. International warfare is now waged on the digital stage, changing how countries influence global conflicts' outcomes. We live in an era of computers, data, and digital connections. This book will give you a better understanding of the current threats and solutions from the world of cyber warfare.
-
Cyber Warfare in 2022
- Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates
- Narrateur(s): Mandy Grant-Grierson
- Durée: 3 h et 19 min
- Date de publication: 2023-11-18
- Langue: Anglais
-
We live in an era of computers, data, and digital connections. This book will give you a better understanding of the current threats and solutions from the world of cyber warfare....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,09 $ ou gratuit avec l'essai de 30 jours
-
-
-
StopRansomware Guide
- Auteur(s): CISA NSA FBI and Multistate Information Sharing and Analysis Center
- Narrateur(s): Tom Brooks
- Durée: 3 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Over time, malicious actors have adjusted their ransomware tactics to be more destructive and impactful, and have also exfiltrated victim data and pressured victims to pay by threatening to release the stolen data.
-
StopRansomware Guide
- Narrateur(s): Tom Brooks
- Durée: 3 h et 9 min
- Date de publication: 2023-11-08
- Langue: Anglais
-
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Democracy in Danger
- How Hackers and Activists Exposed Fatal Flaws in the Election System
- Auteur(s): Jake Braun
- Narrateur(s): James Lurie
- Durée: 6 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
When cybersecurity expert Jake Braun challenged hackers at DEFCON, the largest hacking conference in the world, to breach the security of an American voting machine, a hacker in Europe conquered the task in less than two minutes. From hacking into voting machines to more mundane, but no less serious problems, America's democracy faces unprecedented tests from within and without.
-
Democracy in Danger
- How Hackers and Activists Exposed Fatal Flaws in the Election System
- Narrateur(s): James Lurie
- Durée: 6 h et 53 min
- Date de publication: 2019-10-08
- Langue: Anglais
-
When cybersecurity expert Jake Braun challenged hackers at DEFCON, the largest hacking conference in the world, to breach the security of an American voting machine, a hacker in Europe conquered the task in less than two minutes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Cyber Conundrum
- How Do We Fix Cybersecurity?
- Auteur(s): Peter Chronis
- Narrateur(s): Keith Sellon-Wright
- Durée: 2 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Author Peter K. Chronis claims we need a “moonshot” to bolster our cybersecurity - an astonishing achievement on the scale of wiping out polio, defeating the Nazis, or landing on the moon. The author uses inspiration and lessons from these other complex “moonshots” as a guide to help us develop a comprehensive cybersecurity strategy. The Cyber Conundrum examines the many flaws in global cybersecurity strategy and proposes solutions the tech industry, governments, and companies need to explore to address fundamental cybersecurity challenges.
-
The Cyber Conundrum
- How Do We Fix Cybersecurity?
- Narrateur(s): Keith Sellon-Wright
- Durée: 2 h et 37 min
- Date de publication: 2018-10-24
- Langue: Anglais
-
Author Peter K. Chronis claims we need a “moonshot” to bolster our cybersecurity - an astonishing achievement on the scale of wiping out polio, defeating the Nazis, or landing on the moon....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Quantum Computing
- The Next Frontier
- Auteur(s): Danish Rafiq
- Narrateur(s): Alexis Travis
- Durée: 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Explore the cutting-edge world of quantum computing in Quantum Computing: The Next Frontier. This comprehensive guide demystifies the principles of quantum mechanics, showcases real-world applications, and highlights the leading companies revolutionizing the field. From cryptography to artificial intelligence, discover how quantum computing is poised to reshape industries and solve humanity’s most complex challenges. Whether you're a curious beginner or a tech enthusiast, this book provides an accessible roadmap to understanding the quantum revolution.
-
Quantum Computing
- The Next Frontier
- Narrateur(s): Alexis Travis
- Durée: 7 min
- Date de publication: 2025-01-27
- Langue: Anglais
-
Explore the cutting-edge world of quantum computing in Quantum Computing: The Next Frontier. This comprehensive guide demystifies the principles of quantum mechanics, showcases real-world applications, and highlights the leading companies revolutionizing the field.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
AI Equity
- Byte for All
- Auteur(s): Vivek Dixit
- Narrateur(s): Stephanie Boyette
- Durée: 2 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Embark on a journey with me into the core of AI-driven transformations, tackling challenges, and celebrating triumphs while delving into the ethical dimensions of intelligent machines - uncover the foundations of AI equity and ethical considerations, dive into strategies for inclusive AI design and bias mitigation and explore corporate responsibility, global regulations, policy, and legal aspects.
-
AI Equity
- Byte for All
- Narrateur(s): Stephanie Boyette
- Durée: 2 h et 23 min
- Date de publication: 2024-01-18
- Langue: Anglais
-
Embark on a journey with me into the core of AI-driven transformations, tackling challenges, and celebrating triumphs while delving into the ethical dimensions of intelligent machines....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity and Financial System Resilience Report
- Auteur(s): Board of Governors of the Federal Reserve System
- Narrateur(s): Tom Brooks
- Durée: 3 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Consolidated Appropriations Act, 20211 (CAA) requires the Board of Governors of the Federal Reserve System (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.
-
Cybersecurity and Financial System Resilience Report
- Narrateur(s): Tom Brooks
- Durée: 3 h et 2 min
- Date de publication: 2023-08-31
- Langue: Anglais
-
The Consolidated Appropriations Act, 20211 (CAA) requires the Board of Governors of the Federal Reserve System (Board) to submit annually for seven years a report focused on cybersecurity to Congress....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Jobs Work from Home
- Find Cybersecurity Jobs, Book 3
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 1 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you have ever wanted to work from home as a cybersecurity professional, then this is the book for you. We get straight to the point of how to do it. I have been working remotely as a cybersecurity professional since 2014.
-
Cybersecurity Jobs Work from Home
- Find Cybersecurity Jobs, Book 3
- Narrateur(s): Frank Block
- Série: Find Cybersecurity Jobs, Livre 3
- Durée: 1 h et 8 min
- Date de publication: 2023-02-03
- Langue: Anglais
-
If you have ever wanted to work from home as a cybersecurity professional, then this is the book for you. We get straight to the point of how to do it. I have been working remotely as a cybersecurity professional since 2014....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Normal People
- A Practical Guide to Staying Safe Online
- Auteur(s): Charles Montago
- Narrateur(s): Amanda Utter VO
- Durée: 1 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
When was the last time you used the internet? Chances are, you've been online within the last 10 minutes. While the World Wide Web is integrated into many facets of daily life, there are still risks we take when entering the digital world. But don't fret! Cybersecurity for Normal People is here; your practical guide to staying safe online! Scammers and hackers are all using the same internet we are, and their job is to take advantage of vulnerable users.
-
Cybersecurity for Normal People
- A Practical Guide to Staying Safe Online
- Narrateur(s): Amanda Utter VO
- Durée: 1 h et 22 min
- Date de publication: 2024-09-25
- Langue: Anglais
-
When was the last time you used the internet? Chances are, you've been online within the last 10 minutes. While the World Wide Web is integrated into many facets of daily life, there are still risks we take when entering the digital world.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Phone Phishing (Vishing) for Seniors
- Cyber Safety in 15 Minutes a Day for Seniors (Cyber Safety in 15-Min a Day for Seniors, Book 1)
- Auteur(s): Dr. Feliks Kravets
- Narrateur(s): Barry Fike
- Durée: 1 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book is part of a series titled "CyberSafety in 15 Minutes a Day," aimed specifically at enhancing the awareness of social engineering threats among seniors. Given that seniors are often the primary targets of cyber attacks, the goal of this publication is to support the community by offering cyber safety coaching and enhancing awareness about social engineering tactics.
-
Phone Phishing (Vishing) for Seniors
- Cyber Safety in 15 Minutes a Day for Seniors (Cyber Safety in 15-Min a Day for Seniors, Book 1)
- Narrateur(s): Barry Fike
- Série: Cyber Safety in 15 Minutes a Day for Seniors, Livre 1
- Durée: 1 h et 5 min
- Date de publication: 2024-04-25
- Langue: Anglais
-
This book is part of a series titled "CyberSafety in 15 Minutes a Day," aimed specifically at enhancing the awareness of social engineering threats among seniors.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Handbook for Small to Mid-Size Businesses
- Navigating the Cybersecurity Landscape with Confidence!
- Auteur(s): Oscar Fernandez
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you are like most business owners, you may feel overwhelmed (and sometimes intimidated) by the topic of cybersecurity. You're not alone! The good news is that help is here. The Cybersecurity Handbook for Small to Mid-Size Businesses is designed to demystify cybersecurity and data protection for you. It provides essential knowledge about these topics, as well as cost-effective solutions you can use to protect your business.
-
Cybersecurity Handbook for Small to Mid-Size Businesses
- Navigating the Cybersecurity Landscape with Confidence!
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h
- Date de publication: 2023-08-11
- Langue: Anglais
-
If you are like most business owners, you may feel overwhelmed (and sometimes intimidated) by the topic of cybersecurity. You're not alone! The Cybersecurity Handbook for Small to Mid-Size Businesses is designed to demystify cybersecurity and data protection for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Tips For: 5G Network Slicing
- Security Considerations for Design, Deployment, and Maintenance
- Auteur(s): Cybersecurity National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Enduring Security Framework1 established a working panel comprised of government and industry experts and conducted an in-depth review of the fifth-generation technology for broadband cellular networks standalone network slicing network architecture. This panel assessed the security, risks, benefits, design, deployment, operations, and maintenance of a 5G standalone network slice over two papers: Parts 1 and 2.
-
Tips For: 5G Network Slicing
- Security Considerations for Design, Deployment, and Maintenance
- Narrateur(s): Tom Brooks
- Durée: 3 h et 32 min
- Date de publication: 2023-08-22
- Langue: Anglais
-
The Enduring Security Framework1 established a working panel comprised of government and industry experts and conducted an in-depth review of the fifth-generation technology for broadband cellular networks standalone network slicing network architecture. This panel assessed the security, risks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Scam!
- How to Avoid the Scams That Cost Victims Billions of Dollars Every Year
- Auteur(s): Hope Oje
- Narrateur(s): Alex Freeman
- Durée: 3 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Did you know some people earn their living by stealing from others? SCAM! How to Avoid the Scams That Cost Victims Billions of Dollars Every Year is a short, no-nonsense guide that shows you what to watch out for to protect yourself from the 30 most common types of scams circulating right now.
-
Scam!
- How to Avoid the Scams That Cost Victims Billions of Dollars Every Year
- Narrateur(s): Alex Freeman
- Durée: 3 h et 39 min
- Date de publication: 2022-11-23
- Langue: Anglais
-
SCAM! How to Avoid the Scams That Cost Victims Billions of Dollars Every Year is a short, no-nonsense guide that shows you what to watch out for to protect yourself from the 30 most common types of scams circulating right now....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Improving the Nation’s Cybersecurity
- Executive Order 14028 of May 12, 2021
- Auteur(s): The President of the United States
- Narrateur(s): Tom Brooks
- Durée: 1 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Improving the nation’s cybersecurity by the authority vested in me as president by the Constitution and the laws of the United States of America, it is hereby ordered as follows: Section 1. Policy. The United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy. The Federal Government must improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors.
-
Improving the Nation’s Cybersecurity
- Executive Order 14028 of May 12, 2021
- Narrateur(s): Tom Brooks
- Durée: 1 h et 34 min
- Date de publication: 2021-05-25
- Langue: Anglais
-
The United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet. A global, multistakeholder community made up of many organizations shapes internet policy, operations, and security. But the ongoing and increasing reliance on the internet underscores the need to understand the risks to its underlying architecture.
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Critical Infrastructure Protection:
- Agencies Need to Assess Adoption of Cybersecurity Guidance - February 2022
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 3 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Federal agencies with a lead role to assist and protect one or more of the nation’s 16 critical infrastructures are referred to as sector risk management agencies (SRMAs). The SRMAs for three of the 16 have determined the extent of their sector’s adoption of the National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity (framework). In doing so, lead agencies took actions such as developing sector surveys and conducting technical assessments mapped to framework elements.
-
Critical Infrastructure Protection:
- Agencies Need to Assess Adoption of Cybersecurity Guidance - February 2022
- Narrateur(s): Tom Brooks
- Durée: 3 h et 6 min
- Date de publication: 2022-03-04
- Langue: Anglais
-
Federal agencies with a lead role to assist and protect one or more of the nation’s 16 critical infrastructures are referred to as sector risk management agencies (SRMAs)....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Evolving Electric Power Systems and Cybersecurity
- Auteur(s): Congressional Research Service
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging, and one of the tools for modernizing the system is the incorporation of computerized systems that allow for the rapid monitoring and control of the equipment used in the grid. Connecting these systems to the internet has increased the ability to remotely control aspects of the grid, but this has come with increasing concern for the grid’s cybersecurity.
-
Evolving Electric Power Systems and Cybersecurity
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Date de publication: 2021-11-29
- Langue: Anglais
-
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
IT-Sicherheit
- Tom's, Cybercrime, Awareness
- Auteur(s): Alexander Förster
- Narrateur(s): Alexander Förster
- Durée: 2 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Mit diesem Hörbuch haben Sie die Möglichkeit überall und zu jeder Zeit zu lernen. Egal ob auf dem Weg zur Arbeit, während der Nachtschicht oder zuhause. Entscheiden Sie wann die beste Zeit zum lernen ist. Die 5 Kapitel dieses Hörbuches führen Sie durch alle Themen rund um technisch, organisatorische Maßnahmen zur Datensicherheit. Außerdem werden die gängigen Angriffsarten sog. Cyberkrimineller näher erläutert und mit Fallbeispielen hinterlegt.
-
IT-Sicherheit
- Tom's, Cybercrime, Awareness
- Narrateur(s): Alexander Förster
- Durée: 2 h et 13 min
- Date de publication: 2021-06-28
- Langue: Allemand
-
Mit diesem Hörbuch haben Sie die Möglichkeit überall und zu jeder Zeit zu lernen. Egal ob auf dem Weg zur Arbeit, während der...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
NIST Cybersecurity & Privacy Program
- Auteur(s): National Institute of Standards and Technology (NIST)
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public. Our work ranges from specific information that can be put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.
-
NIST Cybersecurity & Privacy Program
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Date de publication: 2021-07-19
- Langue: Anglais
-
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-