Information Security
-
-
Information Is Power
- World Keeper, Book 9
- Auteur(s): Justin Miller
- Narrateur(s): Stephen Bel Davies
- Durée: 30 h et 10 min
- Version intégrale
-
Au global5 out of 5 stars 3
-
Performance5 out of 5 stars 1
-
Histoire5 out of 5 stars 1
The Void has shown itself, forcing Dale to confront an all new type of enemy, one that cannot merely be beaten back with physical force. He must adapt to the rules of these new monsters and learn how to overcome them, while keeping the threats from within his own world from destroying everything.
-
Information Is Power
- World Keeper, Book 9
- Narrateur(s): Stephen Bel Davies
- Série: World Keeper, Livre 9
- Durée: 30 h et 10 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The Void has shown itself, forcing Dale to confront a new type of enemy, one that cannot merely be beaten back with physical force. He must adapt to the rules of these new monsters and learn how to overcome them, while keeping the threats from his own world from destroying everything....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
38,97 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cloud Security for Dummies
- Auteur(s): Ted Coombs
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Version intégrale
-
Au global2 out of 5 stars 1
-
Performance2 out of 5 stars 1
-
Histoire4 out of 5 stars 1
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security for Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom up.
-
Cloud Security for Dummies
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Date de publication: 2022-03-29
- Langue: Anglais
-
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
38,97 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Privacy Fallacy
- Harm and Power in the Information Economy
- Auteur(s): Ignacio Cofone
- Narrateur(s): Alex Freeman
- Durée: 9 h et 39 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Our data is besieged daily in the information economy, leading to hidden AI harms. Companies can do this because our laws are built on outdated ideas that trap lawmakers, regulators, and courts into wrong assumptions, resulting in ineffective approaches to one of the most pressing concerns of our generation. Drawing on behavioral science, social data science, and economics, this book dispels enduring misconceptions about AI-driven interactions. Its exploration offers a view of why current regulations fail to protect us against digital harms, particularly those created by AI.
-
The Privacy Fallacy
- Harm and Power in the Information Economy
- Narrateur(s): Alex Freeman
- Durée: 9 h et 39 min
- Date de publication: 2024-10-02
- Langue: Anglais
-
Our data is besieged daily in the information economy, leading to hidden AI harms.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Date de publication: 2024-03-06
- Langue: Anglais
-
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Psychology of Information Security
- Auteur(s): Leron Zinatullin
- Narrateur(s): Peter Silverleaf
- Durée: 2 h et 12 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Based on insights gained from academic research, as well as interviews with UK-based security professionals from various sectors, The Psychology of Information Security describes how resolving conflicts between security compliance and human behavior explains the importance of careful risk management and how to align a security program with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.
-
The Psychology of Information Security
- Narrateur(s): Peter Silverleaf
- Durée: 2 h et 12 min
- Date de publication: 2018-11-27
- Langue: Anglais
-
Based on insights gained from academic research, The Psychology of Information Security describes how resolving conflicts between security compliance and human behavior explains the importance of careful risk management....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Auteur(s): Jack Jones
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
What do you know about hacking a computer system? If you are like most of us, you can't even get into your own computer if you've forgotten the password. The good news is that hacking is actually a lot easier than you think, and anyone can learn how to do it. As long as you are willing to do the work and to work through the steps patiently, you will also be able to hack the systems that you want to.
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Date de publication: 2017-09-25
- Langue: Anglais
- If you are like most of us, you can't even get into your own computer if you've forgotten the password....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Countdown to Terror
- The Top-Secret Information that Could Prevent the Next Terrorist Attack on America - and How the CIA Has Ignored It
- Auteur(s): Curt Weldon
- Narrateur(s): Alpha Trivette
- Durée: 5 h et 53 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
If someone knew when and where the next major terrorist attack was to be to take place against America, wouldn't the US intelligence community want to know about it? In Countdown to Terror, US Congressman Curt Weldon, proves that "Ali," an informant with access to the minutes of the most secret Iranian councils does have details about many plots against the US. In fact, he has outright predicted - days, weeks, or months in advance - numerous terrorist plots that were actually carried out our thwarted at the last minute.
-
Countdown to Terror
- The Top-Secret Information that Could Prevent the Next Terrorist Attack on America - and How the CIA Has Ignored It
- Narrateur(s): Alpha Trivette
- Durée: 5 h et 53 min
- Date de publication: 2013-07-02
- Langue: Anglais
- If someone knew when and where the next major terrorist attack was to be to take place against America, wouldn't the US intelligence community want to know about it....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
CC Certified in Cybersecurity All-in-One Exam Guide
- Auteur(s): Jordan Genung, Steven Bennett
- Narrateur(s): Mike Chamberlain
- Durée: 11 h et 42 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Take the Certified in Cybersecurity exam from (ISC)2 with confidence using the information contained in this comprehensive study guide. Written by a pair of cybersecurity experts and successful trainers, CC Certified in Cybersecurity All-in-One Exam Guide offers background material, detailed examples, and over 200 practice questions.
-
CC Certified in Cybersecurity All-in-One Exam Guide
- Narrateur(s): Mike Chamberlain
- Durée: 11 h et 42 min
- Date de publication: 2024-07-09
- Langue: Anglais
-
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,30 $ ou gratuit avec l'essai de 30 jours
-
-
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Auteur(s): Sean D. Mack
- Narrateur(s): William Sarris
- Durée: 7 h et 9 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In The DevSecOps Playbook: Deliver Continuous Security at Speed, the chief information and information security officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You'll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You'll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks.
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Narrateur(s): William Sarris
- Durée: 7 h et 9 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
An essential and up-to-date guide to DevSecOps....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Auteur(s): Andy Greenberg
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Version intégrale
-
Au global4.5 out of 5 stars 2
-
Performance5 out of 5 stars 2
-
Histoire4.5 out of 5 stars 2
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Date de publication: 2012-09-17
- Langue: Anglais
- The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Auteur(s): David Rauschendorfer
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Every organization today faces an ever-changing set of threats in this digital landscape. Understanding how to develop a functional information security program to protect your organization’s reputation and brand from being tarnished due to a breach of your company’s sensitive information is more critical than ever. Developing a functional program that sets up the best information security practices across the organization’s operational workflows, is the leading practice for protecting against a possible breach.
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Date de publication: 2021-11-12
- Langue: Anglais
-
Every organization today faces an ever-changing set of threats in this digital landscape....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Kingdom of Lies
- Unnerving Adventures in the World of Cybercrime
- Auteur(s): Kate Fazzini
- Narrateur(s): Khristine Hvam
- Durée: 6 h et 19 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
"Kingdom of Lies is a brilliant and bold debut, as full of suspense as the best crime thrillers.” —Linda Fairstein, New York Times bestselling author of Blood Oath In the tradition of Michael Lewis and Tom Wolfe, a fascinating and frightening behind-the-scenes look at the interconnected...
-
Kingdom of Lies
- Unnerving Adventures in the World of Cybercrime
- Narrateur(s): Khristine Hvam
- Durée: 6 h et 19 min
- Date de publication: 2019-06-11
- Langue: Anglais
- "Kingdom of Lies is a brilliant and bold debut, as full of suspense as the best crime thrillers.” —Linda Fairstein, New York Times bestselling author of Blood Oath In the tradition of Michael Lewis and Tom Wolfe, a fascinating and frightening behind-the-scenes look at the interconnected...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Informationist
- A Thriller
- Auteur(s): Taylor Stevens
- Narrateur(s): Hillary Huber
- Durée: 12 h et 19 min
- Version intégrale
-
Au global4 out of 5 stars 6
-
Performance4 out of 5 stars 4
-
Histoire4 out of 5 stars 4
Vanessa “Michael” Munroe deals in information - expensive information - working for corporations, heads of state, private clients, and anyone else who can pay for her unique brand of expertise. Born to missionary parents in lawless central Africa, Munroe took up with an infamous gunrunner and his mercenary crew when she was just fourteen. As his protégé, she earned the respect of the jungle's most dangerous men, cultivating her own reputation for years until something sent her running. After almost a decade building a new life and lucrative career from her home base in Dallas, she's never looked back. Until now....
-
The Informationist
- A Thriller
- Narrateur(s): Hillary Huber
- Série: Vanessa Munroe, Livre 1
- Durée: 12 h et 19 min
- Date de publication: 2011-03-08
- Langue: Anglais
- Vanessa “Michael” Munroe deals in information - expensive information - working for corporations, heads of state, private clients, and anyone else who can pay for her unique brand of expertise....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
Beginners Guide to Hacking and Cyber Security: Written by former Army Cyber Security Analyst and Federal Agent
- Information Technology by Sam
- Auteur(s): Samuel Castro
- Narrateur(s): Devon Michael Scott
- Durée: 2 h et 33 min
- Version intégrale
-
Au global4 out of 5 stars 1
-
Performance4 out of 5 stars 1
-
Histoire4 out of 5 stars 1
Welcome to the first and only book you will ever need on the topic of cyber law and cyber security. learn hacking techniques, cyber law, and white hat operations. Perfect for Beginners: If you’re brand new or an expert in cyber security, you’ll still find this guide a solid purchase to add to your skill set, develop new skills and techniques, or revamp old ones and sharpen yourself with cyber security and cyber law.
-
Beginners Guide to Hacking and Cyber Security: Written by former Army Cyber Security Analyst and Federal Agent
- Information Technology by Sam
- Narrateur(s): Devon Michael Scott
- Durée: 2 h et 33 min
- Date de publication: 2019-06-13
- Langue: Anglais
-
Welcome to the first and only book you will ever need on the topic of cyber law and cyber security. learn hacking techniques, cyber law, and white hat operations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Best Practices for Securing Your Home Network
- Cybersecurity Information February 2023
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 33 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Don't be a victim! Malicious cyber actors may leverage your home network to gain access to personal, private, and confidential information. Help protect yourself, your family, and your work by practicing cybersecurity-aware behaviors, observing some basic configuration guidelines, and implementing the following mitigations on your home network.
-
Best Practices for Securing Your Home Network
- Cybersecurity Information February 2023
- Narrateur(s): Tom Brooks
- Durée: 1 h et 33 min
- Date de publication: 2023-04-18
- Langue: Anglais
-
Don't be a victim! Malicious cyber actors may leverage your home network to gain access to personal, private, and confidential information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Putin’s Trolls
- On the Frontlines of Russia’s Information War against the World
- Auteur(s): Jessikka Aro
- Narrateur(s): Jessikka Aro
- Durée: 12 h et 13 min
- Version intégrale
-
Au global4 out of 5 stars 2
-
Performance3 out of 5 stars 2
-
Histoire4.5 out of 5 stars 2
In this courageous and unflinching book, award-winning journalist Jessikka Aro interweaves her own dramatic story as a target of Russian social media propaganda with accounts from many internationally known critics of the Kremlin, who share their own stories of being targeted by Russia’s multifaceted cyber warfare campaigns.
-
3 out of 5 stars
-
interesting listen
- Écrit par Graham Ducke Oldreive le 2023-09-19
-
Putin’s Trolls
- On the Frontlines of Russia’s Information War against the World
- Narrateur(s): Jessikka Aro
- Durée: 12 h et 13 min
- Date de publication: 2022-06-28
- Langue: Anglais
-
A chilling account of Russian information warfare, Putin’s Trolls exposes the individuals and organizations behind the Kremlin’s coordinated, military-style social media operations against the West....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,13 $ ou gratuit avec l'essai de 30 jours
-
-
-
An Introduction to Information Security and ISO 27001 (2013): A Pocket Guide
- Auteur(s): Steve Watkins
- Narrateur(s): Andy Cresswell
- Durée: 53 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
It is estimated that standard computer-based defense systems catch only 25 percent of malware attacks. Do you know the risks you’re running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. This is a comprehensive guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack.
-
An Introduction to Information Security and ISO 27001 (2013): A Pocket Guide
- Narrateur(s): Andy Cresswell
- Durée: 53 min
- Date de publication: 2018-12-06
- Langue: Anglais
-
An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Security Threats
- A Ring of Fire Novel (NESS Series, Book 3)
- Auteur(s): Bjorn Hasseler
- Narrateur(s): P.J. Ochlan
- Durée: 11 h et 16 min
- Version intégrale
-
Au global5 out of 5 stars 1
-
Performance5 out of 5 stars 1
-
Histoire5 out of 5 stars 1
Neustatter's European Security Services encounters a campaign of industrial sabotage, a pastor who attempts to limit their client base, an espionage ring, and the aftermath of the Dreeson assassination. Old nemeses and new allies complicate matters. Somewhere in Grantville is a missing heiress. There's also a Resistance, and it has cookies. Even repeat business with established clients is complicated, not to mention dangerous. Real life proves more complicated than Neustatter's movies or Astrid's books as NESS looks for common threads. Which incidents are related and which are not?
-
Security Threats
- A Ring of Fire Novel (NESS Series, Book 3)
- Narrateur(s): P.J. Ochlan
- Série: NESS Series, Livre 3
- Durée: 11 h et 16 min
- Date de publication: 2023-07-18
- Langue: Anglais
-
Neustatter's European Security Services encounters a campaign of industrial sabotage, a pastor who attempts to limit their client base, an espionage ring, and the aftermath of the Dreeson assassination. Old nemeses and new allies complicate matters....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Information Systems Security NIST 800 2-in-1
- RMF Foundations & Controls
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 5 h et 59 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Unlock the secrets to mastering the NIST 800 risk management process in record time with this powerful 2-in-1 bundle! Introducing Information Systems Security NIST 800 2-in-1, featuring both RMF ISSO Foundation Guide and RMF ISSO: NIST 800-53. This comprehensive series is your ultimate roadmap to success, designed to simplify the complexities of NIST 800-53 security controls and show you the actionable steps required throughout the RMF process.
-
Information Systems Security NIST 800 2-in-1
- RMF Foundations & Controls
- Narrateur(s): Frank Block
- Durée: 5 h et 59 min
- Date de publication: 2023-08-22
- Langue: Anglais
-
Introducing Information Systems Security NIST 800 2-in-1, featuring both RMF ISSO Foundation Guide and RMF ISSO: NIST 800-53. This comprehensive series is your ultimate roadmap to success, designed to simplify the complexities of NIST 800-53 security controls....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- Auteur(s): Noah Zhang
- Narrateur(s): Gary Westphalen
- Durée: 2 h et 1 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Our society has become saturated with internet-connected devices and trackers everywhere. From home routers to your mobile phones, most people are easily hacked if targeted. In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual.
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- Narrateur(s): Gary Westphalen
- Durée: 2 h et 1 min
- Date de publication: 2019-10-17
- Langue: Anglais
-
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-