Computer Security
-
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Auteur(s): Jennifer Bleam
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
What value does managed security bring when there’s no way to promise ROI? How do you convince small business owners to part with their hard-earned revenue when they don’t feel vulnerable to a cyberattack? What is the best way to mitigate your clients’ risk without feeling dishonest or using slimy sales tactics? And could someone please demystify sales and make it easy? This book is the answer to all those questions and more. Forged in the steel of real-world MSP successes and failures, you’ll learn how to sell cybersecurity, simply and easily—even for the techiest tech in the industry.
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Date de publication: 2023-09-18
- Langue: Anglais
-
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Cybersecurity Blueprint for Executives
- A No-Nonsense Guide to What To Do When Attacked, How To Mitigate Risk, and Make Smarter Business Decisions To Enhance Your Leadership Impact
- Auteur(s): Marco Ryan, Andrew Fitzmaurice
- Narrateur(s): James Moors
- Durée: 9 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
"The Cybersecurity Blueprint for Executives" transforms complex cyber challenges into clear, actionable strategies for business leaders. Authors Marco Ryan and Andrew Fitzmaurice draw upon their expertise across government, academia, and business to provide answers you need.
-
The Cybersecurity Blueprint for Executives
- A No-Nonsense Guide to What To Do When Attacked, How To Mitigate Risk, and Make Smarter Business Decisions To Enhance Your Leadership Impact
- Narrateur(s): James Moors
- Durée: 9 h et 8 min
- Date de publication: 2024-11-11
- Langue: Anglais
-
"The Cybersecurity Blueprint for Executives" transforms complex cyber challenges into clear, actionable strategies for business leaders. Authors Marco Ryan and Andrew Fitzmaurice draw upon their expertise across government, academia, and business to provide answers you need.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- Auteur(s): Glenn Greenwald
- Narrateur(s): L. J. Ganser
- Durée: 9 h et 49 min
- Version intégrale
-
Au global23
-
Performance17
-
Histoire18
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- Narrateur(s): L. J. Ganser
- Durée: 9 h et 49 min
- Date de publication: 2014-08-19
- Langue: Anglais
- Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Auteur(s): Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website.
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
14,47 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: 2 Books in 1 Bargain
- The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
- Auteur(s): Miles Price
- Narrateur(s): Matyas Job Gombos
- Durée: 2 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Inside this audiobook, we aim to show you the importance of staying on top of this threat by learning how to hack. While it is true that hackers have received a bad rep over the years, mostly due to biased media reporting, not all hackers have criminal intentions. This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks.
-
Hacking: 2 Books in 1 Bargain
- The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
- Narrateur(s): Matyas Job Gombos
- Durée: 2 h et 59 min
- Date de publication: 2018-02-23
- Langue: Anglais
-
This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Auteur(s): Gabriella Coleman
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Version intégrale
-
Au global2
-
Performance1
-
Histoire1
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Date de publication: 2017-01-31
- Langue: Anglais
- Anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,82 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Rule of Thoughts (Mortality Doctrine, Book Two)
- Auteur(s): James Dashner
- Narrateur(s): Erik Davies
- Durée: 10 h et 11 min
- Version intégrale
-
Au global8
-
Performance8
-
Histoire8
From James Dashner, author of the #1 New York Times bestselling MAZE RUNNER series, comes the second book in the bestselling Mortality Doctrine series, an edge-of-your-seat cyber-adventure trilogy that includes The Eye of Minds and The Game of Lives. Includes a sneak peek of The Fever Code...
-
The Rule of Thoughts (Mortality Doctrine, Book Two)
- Narrateur(s): Erik Davies
- Série: Mortality Doctrine, Livre 2
- Durée: 10 h et 11 min
- Date de publication: 2014-08-26
- Langue: Anglais
- From James Dashner, author of the #1 New York Times bestselling MAZE RUNNER series, comes the second book in the bestselling Mortality Doctrine series, an edge-of-your-seat cyber-adventure trilogy that includes The Eye of Minds and The Game of Lives. Includes a sneak peek of The Fever Code...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,97 $ ou gratuit avec l'essai de 30 jours
-
-
-
Technocreep
- The Surrender of Privacy and the Capitalization of Intimacy
- Auteur(s): Thomas P. Keenan
- Narrateur(s): Thomas P. Keenan
- Durée: 9 h et 31 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
With security scares like the Heartbleed bug (which compromised even supposedly safe internet behemoths like Google and Yahoo!) becoming more commonplace, this book is a must-listen for anybody who values their privacy in a wired world.
-
-
beautiful and scary story about technology
- Écrit par Nataliya le 2023-01-05
-
Technocreep
- The Surrender of Privacy and the Capitalization of Intimacy
- Narrateur(s): Thomas P. Keenan
- Durée: 9 h et 31 min
- Date de publication: 2014-10-14
- Langue: Anglais
- Here is the definitive dissection of privacy-eroding and life-invading technologies, coming at you from governments, corporations, and the person next door....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
ISO 9001:2015
- A Pocket Guide
- Auteur(s): Steve Watkins, Nick Orchiston
- Narrateur(s): Andy Cresswell
- Durée: 1 h et 11 min
- Version intégrale
-
Au global3
-
Performance1
-
Histoire1
Currently used by more than 1.1 million organizations worldwide, the international standard ISO 9001:2015 is the world’s most established quality framework. ISO 9001:2015 - A Pocket Guide is a handy reference audiobook that provides an overview of the ISO 9001 quality management standard.
-
ISO 9001:2015
- A Pocket Guide
- Narrateur(s): Andy Cresswell
- Durée: 1 h et 11 min
- Date de publication: 2018-12-04
- Langue: Anglais
-
Currently used by more than 1.1 million organizations worldwide, the international standard ISO 9001:2015 is the world’s most established quality framework. This is a handy reference audiobook that provides an overview of the ISO 9001 quality management standard....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Auteur(s): Perry Carpenter, Kai Roer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
Really good book, but lots of diagrams
- Écrit par Vince le 2022-12-16
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven insights into how to transform your organization's security culture and reduce human risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Date de publication: 2024-03-06
- Langue: Anglais
-
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Zero Trust Architecture
- Networking Technology: Security
- Auteur(s): Cindy Green-Ortiz, Brandon Fowler, David Houck, Autres
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Zero Trust Architecture
- Networking Technology: Security
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Date de publication: 2024-04-11
- Langue: Anglais
-
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,27 $ ou gratuit avec l'essai de 30 jours
-
-
-
Because You Can: Your Cybersecurity Career
- A Simple and Practical Handbook with Actionable Insights for Success
- Auteur(s): Ali Khan, Gaurav Kumar, Arlene Worsley
- Narrateur(s): Skye Alley
- Durée: 9 h et 42 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most sought-after professionals. Cybersecurity is one of the hottest jobs on the market today, with comparatively high wages and unparalleled growth opportunities. With the organic move to the cloud, digital-first initiatives, and the socioeconomic pressures from the pandemic, the cybersecurity talent demand is unprecedented.
-
Because You Can: Your Cybersecurity Career
- A Simple and Practical Handbook with Actionable Insights for Success
- Narrateur(s): Skye Alley
- Durée: 9 h et 42 min
- Date de publication: 2022-04-20
- Langue: Anglais
-
As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most sought-after professionals. Cybersecurity is one of the hottest jobs on the market today, with comparatively high wages and unparalleled growth opportunities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Blockchain and the Law
- The Rule of Code
- Auteur(s): Primavera De Filippi, Aaron Wright
- Narrateur(s): Teri Schnaubelt
- Durée: 8 h et 55 min
- Version intégrale
-
Au global4
-
Performance3
-
Histoire3
Blockchain technology could affect governance itself by supporting new organizational structures that promote more democratic and participatory decision making. Primavera De Filippi and Aaron Wright acknowledge this potential and urge the law to catch up. That is because disintermediation - a blockchain's greatest asset - subverts critical regulation. By cutting out middlemen, such as online operators and multinational corporations, blockchains run the risk of undermining the capacity of governmental authorities to supervise activities in banking, commerce, law, and other vital areas.
-
Blockchain and the Law
- The Rule of Code
- Narrateur(s): Teri Schnaubelt
- Durée: 8 h et 55 min
- Date de publication: 2018-08-21
- Langue: Anglais
-
De Filippi and Wright welcome the new possibilities inherent in blockchains. But as Blockchain and the Law makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
There's No Such Thing as Crypto Crime
- An Investigative Handbook
- Auteur(s): Nick Furneaux
- Narrateur(s): Mitch Crawford
- Durée: 20 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains. The book explores the criminal opportunities available to malicious actors in the crypto universe, as well as the investigative principles common to this realm.
-
There's No Such Thing as Crypto Crime
- An Investigative Handbook
- Narrateur(s): Mitch Crawford
- Durée: 20 h et 29 min
- Date de publication: 2024-12-31
- Langue: Anglais
-
Accomplished cybersecurity and forensics consultant Nick Furneaux delivers an expert discussion of the key methods used by cryptocurrency investigators, including investigations on Bitcoin and Ethereum type blockchains.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Fundamentals
- Governance Risk & Compliance (GRC) (Cybersecurity Beginner, Book 2)
- Auteur(s): Bruce Brown
- Narrateur(s): Kevin Howard
- Durée: 3 h et 16 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Discover the Secrets of Cybersecurity Governance, Risk, and Compliance with Cybersecurity Fundamentals: Governance, Risk & Compliance by Bruce Brown, CISSP, CGRC. In the ever-evolving world of cybersecurity, understanding the intricacies of Governance, Risk, and Compliance (GRC) is not just beneficial—it's essential. Despite being one of the most crucial areas in cybersecurity, GRC is often overlooked, leaving many professionals unprepared for the challenges ahead. This book changes that narrative.
-
Cybersecurity Fundamentals
- Governance Risk & Compliance (GRC) (Cybersecurity Beginner, Book 2)
- Narrateur(s): Kevin Howard
- Série: Cybersecurity Beginner, Livre 2
- Durée: 3 h et 16 min
- Date de publication: 2024-10-03
- Langue: Anglais
-
Discover the Secrets of Cybersecurity Governance, Risk, and Compliance with Cybersecurity Fundamentals: Governance, Risk & Compliance by Bruce Brown, CISSP, CGRC.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security Program and Policy Using NIST Cybersecurity Framework
- NIST Cybersecurity Framework (CSF), Book 2
- Auteur(s): Bruce Brown, convocourses
- Narrateur(s): Kim Pepper
- Durée: 3 h et 29 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In today's digital age, safeguarding your organization's assets from cyber threats is paramount. Equip yourself with the knowledge and tools necessary with Cyber Security Program and Policy Using NIST Cybersecurity Framework by seasoned cybersecurity professionals. This guide steers you through the process of creating robust, professional documents and procedures designed to protect your data and digital assets from evolving cyber risks.
-
Cyber Security Program and Policy Using NIST Cybersecurity Framework
- NIST Cybersecurity Framework (CSF), Book 2
- Narrateur(s): Kim Pepper
- Série: NIST Cybersecurity Framework, Livre 2
- Durée: 3 h et 29 min
- Date de publication: 2023-09-25
- Langue: Anglais
-
This guide steers you through the process of creating robust, professional documents and procedures designed to protect your data and digital assets from evolving cyber risks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Auteur(s): Norman Laurence
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Date de publication: 2020-10-21
- Langue: Anglais
-
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Auteur(s): George Finney, John Kindervag - foreword
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Date de publication: 2022-10-04
- Langue: Anglais
-
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- Auteur(s): Taimur Ijlal
- Narrateur(s): Scott Mandeville
- Durée: 4 h et 57 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Dive into the dynamic world of cybersecurity with the 'CompTIA Security+ Revision Guide'. This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals. Learn about the unique risks in the digital realm, develop a robust security framework, and understand the intricacies of cybersecurity in various systems. This book is crafted for easy comprehension, requiring no prior expertise in cybersecurity or programming.
-
CompTIA Security+ Revision Guide: Real-World Examples
- Master the CompTia Security+ SY0-701 Exam Using Real-World Scenarios
- Narrateur(s): Scott Mandeville
- Durée: 4 h et 57 min
- Date de publication: 2024-02-28
- Langue: Anglais
-
This indispensable guide, expertly designed for the SY0-701 exam, offers a comprehensive exploration of cybersecurity principles, tailored for both beginners and professionals.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-