Information Security Program
-
-
The Information
- A History, a Theory, a Flood
- Auteur(s): James Gleick
- Narrateur(s): Rob Shapiro
- Durée: 16 h et 37 min
- Version intégrale
-
Au global39
-
Performance35
-
Histoire34
James Gleick, the author of the best sellers Chaos and Genius, now brings us a work just as astonishing and masterly: a revelatory chronicle and meditation that shows how information has become the modern era’s defining quality—the blood, the fuel, the vital principle of our world. The...
-
-
So, hear me out...
- Écrit par Quenton le 2019-09-26
-
The Information
- A History, a Theory, a Flood
- Narrateur(s): Rob Shapiro
- Durée: 16 h et 37 min
- Date de publication: 2011-03-01
- Langue: Anglais
- James Gleick, the author of the best sellers Chaos and Genius, now brings us a work just as astonishing and masterly: a revelatory chronicle and meditation that shows how information has become the modern era’s defining quality—the blood, the fuel, the vital principle of our world. The...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
29,14 $ ou gratuit avec l'essai de 30 jours
-
-
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Auteur(s): David Rauschendorfer
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Every organization today faces an ever-changing set of threats in this digital landscape. Understanding how to develop a functional information security program to protect your organization’s reputation and brand from being tarnished due to a breach of your company’s sensitive information is more critical than ever. Developing a functional program that sets up the best information security practices across the organization’s operational workflows, is the leading practice for protecting against a possible breach.
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Date de publication: 2021-11-12
- Langue: Anglais
-
Every organization today faces an ever-changing set of threats in this digital landscape....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
National Security
- A Jericho Quinn Thriller, Book 1
- Auteur(s): Marc Cameron
- Narrateur(s): Tom Weiner
- Durée: 8 h et 56 min
- Version intégrale
-
Au global22
-
Performance21
-
Histoire21
Warning: The next terrorist attack on American soil is coming...sooner than you think. They can strike anytime, anywhere. A public landmark. A suburban shopping mall. And now, the human body itself. Three Middle Eastern terrorists have been injected with a biological weapon, human time bombs unleashed on American soil. They are prepared to die. To spread their disease. To annihilate millions. If America hopes to fight this enemy from within, we need a new kind of weapon. Meet Special Agent Jericho Quinn. Air Force veteran. Champion boxer. Trained assassin.
-
National Security
- A Jericho Quinn Thriller, Book 1
- Narrateur(s): Tom Weiner
- Série: Jericho Quinn, Livre 1
- Durée: 8 h et 56 min
- Date de publication: 2020-08-04
- Langue: Anglais
-
Warning: The next terrorist attack on American soil is coming...sooner than you think. They can strike anytime, anywhere. A public landmark. A suburban shopping mall. And now, the human body itself. Three Middle Eastern terrorists have been injected with a biological weapon....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Information Is Power
- World Keeper, Book 9
- Auteur(s): Justin Miller
- Narrateur(s): Stephen Bel Davies
- Durée: 30 h et 10 min
- Version intégrale
-
Au global3
-
Performance1
-
Histoire1
The Void has shown itself, forcing Dale to confront an all new type of enemy, one that cannot merely be beaten back with physical force. He must adapt to the rules of these new monsters and learn how to overcome them, while keeping the threats from within his own world from destroying everything.
-
Information Is Power
- World Keeper, Book 9
- Narrateur(s): Stephen Bel Davies
- Série: World Keeper, Livre 9
- Durée: 30 h et 10 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The Void has shown itself, forcing Dale to confront a new type of enemy, one that cannot merely be beaten back with physical force. He must adapt to the rules of these new monsters and learn how to overcome them, while keeping the threats from his own world from destroying everything....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
38,97 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cloud Security for Dummies
- Auteur(s): Ted Coombs
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security for Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom up.
-
Cloud Security for Dummies
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Date de publication: 2022-03-29
- Langue: Anglais
-
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
38,97 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Informationist
- A Thriller
- Auteur(s): Taylor Stevens
- Narrateur(s): Hillary Huber
- Durée: 12 h et 19 min
- Version intégrale
-
Au global6
-
Performance4
-
Histoire4
Governments pay her. Criminals fear her. Nobody sees her coming. Vanessa “Michael” Munroe deals in information—expensive information—working for corporations, heads of state, private clients, and anyone else who can pay for her unique brand of expertise. Born to missionary parents in...
-
The Informationist
- A Thriller
- Narrateur(s): Hillary Huber
- Série: Vanessa Munroe, Livre 1
- Durée: 12 h et 19 min
- Date de publication: 2011-03-08
- Langue: Anglais
- Governments pay her. Criminals fear her. Nobody sees her coming. Vanessa “Michael” Munroe deals in information—expensive information—working for corporations, heads of state, private clients, and anyone else who can pay for her unique brand of expertise. Born to missionary parents in...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
Security Threats
- A Ring of Fire Novel (NESS Series, Book 3)
- Auteur(s): Bjorn Hasseler
- Narrateur(s): P.J. Ochlan
- Durée: 11 h et 16 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Neustatter's European Security Services encounters a campaign of industrial sabotage, a pastor who attempts to limit their client base, an espionage ring, and the aftermath of the Dreeson assassination. Old nemeses and new allies complicate matters. Somewhere in Grantville is a missing heiress. There's also a Resistance, and it has cookies. Even repeat business with established clients is complicated, not to mention dangerous. Real life proves more complicated than Neustatter's movies or Astrid's books as NESS looks for common threads. Which incidents are related and which are not?
-
Security Threats
- A Ring of Fire Novel (NESS Series, Book 3)
- Narrateur(s): P.J. Ochlan
- Série: NESS Series, Livre 3
- Durée: 11 h et 16 min
- Date de publication: 2023-07-18
- Langue: Anglais
-
Neustatter's European Security Services encounters a campaign of industrial sabotage, a pastor who attempts to limit their client base, an espionage ring, and the aftermath of the Dreeson assassination. Old nemeses and new allies complicate matters....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hive Ransomware
- HHS Cybersecurity Program
- Auteur(s): Office of Information Security
- Narrateur(s): Tom Brooks
- Durée: 1 h et 17 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more.
-
Hive Ransomware
- HHS Cybersecurity Program
- Narrateur(s): Tom Brooks
- Durée: 1 h et 17 min
- Date de publication: 2021-11-11
- Langue: Anglais
-
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-