Internet Security
- 
    
            
            
 
- 
    
                    
  
  
  
Dot Con
 - The Art of Scamming a Scammer
 - Auteur(s): James Veitch
 - Narrateur(s): James Veitch, Naomi Petersen
 - Durée: 2 h et 28 min
 - Version intégrale
 
- 
    
                    
 
Au global5 out of 5 stars 4
 - 
    
                    
 
Performance5 out of 5 stars 4
 - 
    
                    
 
Histoire5 out of 5 stars 4
 
The Nigerian prince eager to fork over his inheritance, the family friend stranded unexpectedly in Norway, the lonely Russian beauty looking for love...they spam our inboxes with their hapless pleas for help, money, and your social security number. In Dot Con, Veitch finally answers the question: What would happen if you replied?
- 
    
                        
    
5 out of 5 stars
 - 
    
                        
  
  
  
Hilarious
 - Écrit par Amazon Customer le 2022-08-19
 
- 
    
                            
  
Dot Con
 - The Art of Scamming a Scammer
 - Narrateur(s): James Veitch, Naomi Petersen
 - Durée: 2 h et 28 min
 - Date de publication: 2020-06-02
 - Langue: Anglais
 - 
    
                                    
 
  
The Nigerian prince eager to fork over his inheritance, the family friend stranded unexpectedly in Norway, the lonely Russian beauty looking for love...they spam our inboxes with their hapless pleas for help, money, and your social security number....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,47 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
Project Zero Trust
 - A Story About a Strategy for Aligning Security and the Business
 - Auteur(s): George Finney, John Kindervag - foreword
 - Narrateur(s): Daniel Thomas May
 - Durée: 7 h et 51 min
 - Version intégrale
 
- 
    
                    
 
Au global5 out of 5 stars 1
 - 
    
                    
 
Performance4 out of 5 stars 1
 - 
    
                    
 
Histoire3 out of 5 stars 1
 
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
- 
    
                            
  
Project Zero Trust
 - A Story About a Strategy for Aligning Security and the Business
 - Narrateur(s): Daniel Thomas May
 - Durée: 7 h et 51 min
 - Date de publication: 2022-10-04
 - Langue: Anglais
 - 
    
                                    
 
  
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
If It's Smart, It's Vulnerable
 - Auteur(s): Mikko Hypponen
 - Narrateur(s): Rich Miller
 - Durée: 7 h et 32 min
 - Version intégrale
 
- 
    
                    
 
Au global5 out of 5 stars 1
 - 
    
                    
 
Performance0 out of 5 stars 0
 - 
    
                    
 
Histoire0 out of 5 stars 0
 
All our devices and gadgets—from our refrigerators to our home security systems—are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing.
- 
    
                            
  
If It's Smart, It's Vulnerable
 - Narrateur(s): Rich Miller
 - Durée: 7 h et 32 min
 - Date de publication: 2022-09-27
 - Langue: Anglais
 - 
    
                                    
 
  
Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
No Safe Harbor
 - The Inside Truth About Cybercrime - and How to Protect Your Business
 - Auteur(s): Mark Sangster
 - Narrateur(s): Kevin Stillwell
 - Durée: 5 h et 27 min
 - Version intégrale
 
- 
    
                    
 
Au global5 out of 5 stars 2
 - 
    
                    
 
Performance4.5 out of 5 stars 2
 - 
    
                    
 
Histoire5 out of 5 stars 2
 
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster tells listeners that cybersecurity is not an IT problem to solve - it is a business risk to manage.
- 
    
                            
  
No Safe Harbor
 - The Inside Truth About Cybercrime - and How to Protect Your Business
 - Narrateur(s): Kevin Stillwell
 - Durée: 5 h et 27 min
 - Date de publication: 2020-12-11
 - Langue: Anglais
 - 
    
                                    
 
  
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
The Language of Deception
 - Weaponizing Next Generation AI
 - Auteur(s): Justin Hutchens
 - Narrateur(s): Mike Chamberlain
 - Durée: 10 h et 38 min
 - Version intégrale
 
- 
    
                    
 
Au global0 out of 5 stars 0
 - 
    
                    
 
Performance0 out of 5 stars 0
 - 
    
                    
 
Histoire0 out of 5 stars 0
 
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes. In the book, you will explore the history of social engineering and social robotics, the psychology of deception, considerations of machine sentience and consciousness, and the history of how technology has been weaponized in the past.
- 
    
                            
  
The Language of Deception
 - Weaponizing Next Generation AI
 - Narrateur(s): Mike Chamberlain
 - Durée: 10 h et 38 min
 - Date de publication: 2024-02-20
 - Langue: Anglais
 - 
    
                                    
 
  
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
Cybersecurity Essentials
 - Auteur(s): Charles J. Brooks, Christopher Grow, Philip Craig, Autres
 - Narrateur(s): Ryan Burke
 - Durée: 17 h et 27 min
 - Version intégrale
 
- 
    
                    
 
Au global3.5 out of 5 stars 3
 - 
    
                    
 
Performance3.5 out of 5 stars 3
 - 
    
                    
 
Histoire3 out of 5 stars 3
 
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
- 
    
                        
    
1 out of 5 stars
 - 
    
                        
  
  
  
Awful as an e-book
 - Écrit par Mac le 2021-07-25
 
- 
    
                            
  
Cybersecurity Essentials
 - Narrateur(s): Ryan Burke
 - Durée: 17 h et 27 min
 - Date de publication: 2018-10-30
 - Langue: Anglais
 - 
    
                                    
 
  
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,53 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
Digital for Good
 - Raising Kids to Thrive in an Online World
 - Auteur(s): Richard Culatta
 - Narrateur(s): Adam Verner
 - Durée: 5 h et 58 min
 - Version intégrale
 
- 
    
                    
 
Au global5 out of 5 stars 1
 - 
    
                    
 
Performance5 out of 5 stars 1
 - 
    
                    
 
Histoire5 out of 5 stars 1
 
Technology can be a powerful tool for learning, for solving humanity's toughest problems, and for bringing us closer together. How can we raise healthy kids who know how to take advantage of the good technology can bring to their lives, while avoiding the bad? It's time to start a new conversation. Digital for Good offers a refreshingly positive framework for preparing kids to be successful in a digital world - one that shifts the focus away from what kids shouldn't do and instead encourages them to use technology proactively and productively.
- 
    
                            
  
Digital for Good
 - Raising Kids to Thrive in an Online World
 - Narrateur(s): Adam Verner
 - Durée: 5 h et 58 min
 - Date de publication: 2021-07-21
 - Langue: Anglais
 - 
    
                                    
 
  
Digital for Good offers a refreshingly positive framework for preparing kids to be successful in a digital world - one that shifts the focus away from what kids shouldn't do and instead encourages them to use technology proactively and productively....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
IAPP CIPP/US Certification
 - A Practical Study Guide to Master the Certified Information Privacy Professional Exam
 - Auteur(s): Jamie Murphy
 - Narrateur(s): Tom Brooks
 - Durée: 5 h et 6 min
 - Version intégrale
 
- 
    
                    
 
Au global0 out of 5 stars 0
 - 
    
                    
 
Performance0 out of 5 stars 0
 - 
    
                    
 
Histoire0 out of 5 stars 0
 
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
- 
    
                            
  
IAPP CIPP/US Certification
 - A Practical Study Guide to Master the Certified Information Privacy Professional Exam
 - Narrateur(s): Tom Brooks
 - Durée: 5 h et 6 min
 - Date de publication: 2024-03-06
 - Langue: Anglais
 - 
    
                                    
 
  
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected.
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
Kali Linux for Beginners
 - Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
 - Auteur(s): Learn Computer Hacking in Deep
 - Narrateur(s): Jowanna Lewis
 - Durée: 3 h et 23 min
 - Version intégrale
 
- 
    
                    
 
Au global1 out of 5 stars 1
 - 
    
                    
 
Performance2 out of 5 stars 1
 - 
    
                    
 
Histoire3 out of 5 stars 1
 
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization. Unless and until you are unaware of the basics, you will not be able to use this software. In fact, for carrying out an effective form of ethical hacking, you will need to learn about the various attacks along with the forms of networks. You can easily find the information in this audiobook.
- 
    
                            
  
Kali Linux for Beginners
 - Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
 - Narrateur(s): Jowanna Lewis
 - Durée: 3 h et 23 min
 - Date de publication: 2020-02-11
 - Langue: Anglais
 - 
    
                                    
 
  
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
CC Certified in Cybersecurity
 - The Complete ISC2 Certification Study Guide
 - Auteur(s): Jamie Murphy
 - Narrateur(s): Tom Brooks
 - Durée: 5 h et 2 min
 - Version intégrale
 
- 
    
                    
 
Au global0 out of 5 stars 0
 - 
    
                    
 
Performance0 out of 5 stars 0
 - 
    
                    
 
Histoire0 out of 5 stars 0
 
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification. Navigating through fundamental concepts and advanced techniques, this book serves as a trusted companion for those seeking to master the intricate landscape of cybersecurity.
- 
    
                            
  
CC Certified in Cybersecurity
 - The Complete ISC2 Certification Study Guide
 - Narrateur(s): Tom Brooks
 - Durée: 5 h et 2 min
 - Date de publication: 2024-04-09
 - Langue: Anglais
 - 
    
                                    
 
  
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification.
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
The Privacy Leader Compass
 - A Comprehensive Business-Oriented Roadmap for Building and Leading Practical Privacy Programs
 - Auteur(s): Dr. Valerie Lyons, Todd Fitzgerald, Dr. Ann Covoukian - Foreword
 - Narrateur(s): Rachel Yong
 - Durée: 15 h et 30 min
 - Version intégrale
 
- 
    
                    
 
Au global0 out of 5 stars 0
 - 
    
                    
 
Performance0 out of 5 stars 0
 - 
    
                    
 
Histoire0 out of 5 stars 0
 
Seasoned award-winning Privacy and Cybersecurity leaders Dr. Valerie Lyons (Dublin, Ireland) and Todd Fitzgerald (Chicago, Illinois, USA) have teamed up with over sixty award-winning CPOs, DPOs, highly respected privacy/data protection leaders, data protection authorities, and privacy standard setters who have fought the tough battle.
- 
    
                            
  
The Privacy Leader Compass
 - A Comprehensive Business-Oriented Roadmap for Building and Leading Practical Privacy Programs
 - Narrateur(s): Rachel Yong
 - Durée: 15 h et 30 min
 - Date de publication: 2026-03-31
 - Langue: Anglais
 - 
    
                                    
 
  
Congratulations! Perhaps you have been appointed as the Chief Privacy Officer (CPO) or the Data Protection Officer (DPO) for your company. Maybe you are an experienced CPO/DPO, and you wonder—"what can I learn from other successful privacy experts to be even more effective?"
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,30 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
Fatal System Error
 - The Hunt for the New Crime Lords Who Are Bringing Down the Internet
 - Auteur(s): Joseph Menn
 - Narrateur(s): Christian Rummel
 - Durée: 8 h et 23 min
 - Version intégrale
 
- 
    
                    
 
Au global3.5 out of 5 stars 2
 - 
    
                    
 
Performance4.5 out of 5 stars 2
 - 
    
                    
 
Histoire3.5 out of 5 stars 2
 
In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia. His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers.
- 
    
                            
  
Fatal System Error
 - The Hunt for the New Crime Lords Who Are Bringing Down the Internet
 - Narrateur(s): Christian Rummel
 - Durée: 8 h et 23 min
 - Date de publication: 2010-01-11
 - Langue: Anglais
 - In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
Messing with the Enemy
 - Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
 - Auteur(s): Clint Watts
 - Narrateur(s): Joe Knezevich
 - Durée: 9 h et 34 min
 - Version intégrale
 
- 
    
                    
 
Au global4.5 out of 5 stars 8
 - 
    
                    
 
Performance4 out of 5 stars 8
 - 
    
                    
 
Histoire4.5 out of 5 stars 8
 
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns that have become the cutting edge of modern warfare - and how we can protect ourselves against them. Clint Watts electrified the nation when he testified regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind.
- 
    
                        
    
5 out of 5 stars
 - 
    
                        
  
  
  
Interesting and engaging
 - Écrit par Mark Dynna le 2018-07-18
 
- 
    
                            
  
Messing with the Enemy
 - Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
 - Narrateur(s): Joe Knezevich
 - Durée: 9 h et 34 min
 - Date de publication: 2018-05-29
 - Langue: Anglais
 - 
    
                                    
 
  
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare - and how we can protect ourselves and our country against them....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,46 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
Hacking: 2 Books in 1 Bargain
 - The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
 - Auteur(s): Miles Price
 - Narrateur(s): Matyas Job Gombos
 - Durée: 2 h et 59 min
 - Version intégrale
 
- 
    
                    
 
Au global0 out of 5 stars 0
 - 
    
                    
 
Performance0 out of 5 stars 0
 - 
    
                    
 
Histoire0 out of 5 stars 0
 
Inside this audiobook, we aim to show you the importance of staying on top of this threat by learning how to hack. While it is true that hackers have received a bad rep over the years, mostly due to biased media reporting, not all hackers have criminal intentions. This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks.
- 
    
                            
  
Hacking: 2 Books in 1 Bargain
 - The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
 - Narrateur(s): Matyas Job Gombos
 - Durée: 2 h et 59 min
 - Date de publication: 2018-02-23
 - Langue: Anglais
 - 
    
                                    
 
  
This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
A Practical Guide to GDPR
 - Auteur(s): David Cauchi
 - Narrateur(s): Dean Collins
 - Durée: 1 h et 6 min
 - Version intégrale
 
- 
    
                    
 
Au global0 out of 5 stars 0
 - 
    
                    
 
Performance0 out of 5 stars 0
 - 
    
                    
 
Histoire0 out of 5 stars 0
 
A practical guide to the EU General Data Protection Regulation (GDPR). GDPR is no quick fix, nor a project with a timeline that ends on May 25, 2018. GDPR is an ongoing process that should lead organizations to achieve and maintain a high level of data-protection compliance and culture.
- 
    
                            
  
A Practical Guide to GDPR
 - Narrateur(s): Dean Collins
 - Durée: 1 h et 6 min
 - Date de publication: 2018-12-10
 - Langue: Anglais
 - 
    
                                    
 
  
A practical guide to the EU General Data Protection Regulation (GDPR)....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
There's a War Going On but No One Can See It
 - Auteur(s): Huib Modderkolk
 - Narrateur(s): Omar Baroud
 - Durée: 8 h et 42 min
 - Version intégrale
 
- 
    
                    
 
Au global4 out of 5 stars 1
 - 
    
                    
 
Performance4 out of 5 stars 1
 - 
    
                    
 
Histoire4 out of 5 stars 1
 
Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us.
- 
    
                            
  
There's a War Going On but No One Can See It
 - Narrateur(s): Omar Baroud
 - Durée: 8 h et 42 min
 - Date de publication: 2021-09-02
 - Langue: Anglais
 - 
    
                                    
 
  
Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
19,12 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
Cyber Wars
 - Hacks That Shocked the Business World
 - Auteur(s): Charles Arthur
 - Narrateur(s): Joe Jameson
 - Durée: 7 h et 40 min
 - Version intégrale
 
- 
    
                    
 
Au global3 out of 5 stars 1
 - 
    
                    
 
Performance3 out of 5 stars 1
 - 
    
                    
 
Histoire3 out of 5 stars 1
 
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are. Charles Arthur provides a gripping account of why each hack happened, what techniques were used, what the consequences were and how they could have been prevented. Cyber attacks are some of the most frightening threats currently facing business leaders, and this book provides a deep insight into understanding how they work.
- 
    
                            
  
Cyber Wars
 - Hacks That Shocked the Business World
 - Narrateur(s): Joe Jameson
 - Durée: 7 h et 40 min
 - Date de publication: 2018-08-09
 - Langue: Anglais
 - 
    
                                    
 
  
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game-changing hacks that make organisations around the world tremble and leaders stop and consider just how safe they really are....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,48 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
Cypherpunks
 - Freedom and the Future of the Internet
 - Auteur(s): Julian Assange
 - Narrateur(s): Tom Pile
 - Durée: 4 h et 13 min
 - Version intégrale
 
- 
    
                    
 
Au global4.5 out of 5 stars 5
 - 
    
                    
 
Performance4.5 out of 5 stars 4
 - 
    
                    
 
Histoire4 out of 5 stars 4
 
Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s. Now, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us.
- 
    
                        
    
5 out of 5 stars
 - 
    
                        
  
  
  
A Prerequisite for Living a Dignified Life in the Modern World
 - Écrit par Dustin le 2024-05-28
 
- 
    
                            
  
Cypherpunks
 - Freedom and the Future of the Internet
 - Narrateur(s): Tom Pile
 - Durée: 4 h et 13 min
 - Date de publication: 2013-06-10
 - Langue: Anglais
 - Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,50 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
Accessing the Deep Web & Dark Web with Tor
 - How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
 - Auteur(s): Jack Jones
 - Narrateur(s): Dan Gralick
 - Durée: 1 h et 4 min
 - Version intégrale
 
- 
    
                    
 
Au global4 out of 5 stars 1
 - 
    
                    
 
Performance4 out of 5 stars 1
 - 
    
                    
 
Histoire4 out of 5 stars 1
 
It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want, do what you want, and buy whatever you want. But there is so much more to the deep web than the Hollywood picture of a lawless frontier land. Sure, there are illicit elements to it. It can be a dangerous place if you don't know what you are doing. But, with all that, it should be remembered what the deep web is all about - it's about freedom of speech in a world of censorship and political correctness.
- 
    
                        
    
4 out of 5 stars
 - 
    
                        
  
  
  
Provides some practical information
 - Écrit par Mary-Anne le 2018-12-15
 
- 
    
                            
  
Accessing the Deep Web & Dark Web with Tor
 - How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
 - Narrateur(s): Dan Gralick
 - Durée: 1 h et 4 min
 - Date de publication: 2017-07-14
 - Langue: Anglais
 - It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want and buy whatever you want....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
 - 
    
                    
  
  
  
 - 
    
            
            
 
- 
    
                    
  
  
  
Stealing Your Life
 - The Ultimate Identity Theft Prevention Plan
 - Auteur(s): Frank W. Abagnale
 - Narrateur(s): Raymond Todd
 - Durée: 7 h et 16 min
 - Version intégrale
 
- 
    
                    
 
Au global4.5 out of 5 stars 3
 - 
    
                    
 
Performance4.5 out of 5 stars 3
 - 
    
                    
 
Histoire4.5 out of 5 stars 3
 
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
- 
    
                            
  
Stealing Your Life
 - The Ultimate Identity Theft Prevention Plan
 - Narrateur(s): Raymond Todd
 - Durée: 7 h et 16 min
 - Date de publication: 2007-04-09
 - Langue: Anglais
 - Someone in the U.S. is an identity-theft victim every four seconds. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes....
 
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
19,84 $ ou gratuit avec l'essai de 30 jours
 -