Internet Security
-
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2023-06-12
- Langue: Anglais
-
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- Auteur(s): Learn Computer Hacking in Deep
- Narrateur(s): Jowanna Lewis
- Durée: 3 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization. Unless and until you are unaware of the basics, you will not be able to use this software. In fact, for carrying out an effective form of ethical hacking, you will need to learn about the various attacks along with the forms of networks. You can easily find the information in this audiobook.
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- Narrateur(s): Jowanna Lewis
- Durée: 3 h et 23 min
- Date de publication: 2020-02-11
- Langue: Anglais
-
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
CompTIA CySA+ Certification
- The Ultimate Study Guide to Practice Questions With Answers and Master the Cybersecurity Analyst Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Unlock the doors to a world of cybersecurity mastery with "Mastering CySA+: A Comprehensive Guide to CompTIA CySA+ Certification." This meticulously crafted guide is your key to conquering the challenges of the CompTIA Cybersecurity Analyst (CySA+) certification, offering a comprehensive blend of practice questions, detailed answers, and a roadmap to confidently pass the exam.
-
CompTIA CySA+ Certification
- The Ultimate Study Guide to Practice Questions With Answers and Master the Cybersecurity Analyst Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 1 min
- Date de publication: 2024-01-16
- Langue: Anglais
-
Unlock the doors to a world of cybersecurity mastery with "Mastering CySA+: A Comprehensive Guide to CompTIA CySA+ Certification." This meticulously crafted guide is your key to conquering the challenges of the CompTIA Cybersecurity Analyst (CySA+) certification....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $
-
-
-
Ransomware Protection Playbook
- Auteur(s): Roger A. Grimes
- Narrateur(s): Danny Campbell
- Durée: 10 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.
-
Ransomware Protection Playbook
- Narrateur(s): Danny Campbell
- Durée: 10 h et 28 min
- Date de publication: 2021-12-31
- Langue: Anglais
-
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83 $
-
-
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Auteur(s): Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What to Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour—from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria—recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes.
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Date de publication: 2023-11-21
- Langue: Anglais
-
A team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92 $
-
-
-
@War
- The Rise of the Military-Internet Complex
- Auteur(s): Shane Harris
- Narrateur(s): Stephen R. Thorne
- Durée: 9 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
Eye opening
- Écrit par Etha le 2022-08-02
-
@War
- The Rise of the Military-Internet Complex
- Narrateur(s): Stephen R. Thorne
- Durée: 9 h et 43 min
- Date de publication: 2014-11-11
- Langue: Anglais
- The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,50 $
-
-
-
Hacking: 2 Books in 1 Bargain
- The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
- Auteur(s): Miles Price
- Narrateur(s): Matyas Job Gombos
- Durée: 2 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Inside this audiobook, we aim to show you the importance of staying on top of this threat by learning how to hack. While it is true that hackers have received a bad rep over the years, mostly due to biased media reporting, not all hackers have criminal intentions. This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks.
-
Hacking: 2 Books in 1 Bargain
- The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
- Narrateur(s): Matyas Job Gombos
- Durée: 2 h et 59 min
- Date de publication: 2018-02-23
- Langue: Anglais
-
This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
The Personal Cybersecurity Manual
- How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes (Home Technology Manuals)
- Auteur(s): Marlon Buchanan
- Narrateur(s): Helpful Matthew
- Durée: 4 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybercrime is on the rise. Our information is more valuable and vulnerable than ever. It’s important to learn to protect ourselves from those who wish to exploit the technology we rely on daily. Cybercriminals want to steal your money and identity and spy on you.
-
The Personal Cybersecurity Manual
- How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes (Home Technology Manuals)
- Narrateur(s): Helpful Matthew
- Durée: 4 h et 22 min
- Date de publication: 2022-10-10
- Langue: Anglais
-
Cybercrime is on the rise. Our information is more valuable and vulnerable than ever. It’s important to learn to protect ourselves from those who wish to exploit the technology we rely on daily. Cybercriminals want to steal your money and identity and spy on you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
NSA Secrets
- Government Spying in the Internet Age
- Auteur(s): The Washington Post
- Narrateur(s): James Adams
- Durée: 6 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The NSA's extensive surveillance program has riveted America as the public questions the threats to their privacy. As reported by The Washington Post, in their Pulitzer Prize-winning coverage of whistleblower Edward Snowden's NSA leaks, NSA Secrets delves into the shadowy world of information gathering, exposing how data about you is being gathered every day. From his earliest encrypted exchanges with reporters, Edward Snowden knew he was a man in danger.
-
NSA Secrets
- Government Spying in the Internet Age
- Narrateur(s): James Adams
- Durée: 6 h et 20 min
- Date de publication: 2015-01-13
- Langue: Anglais
- NSA Secrets delves into the shadowy world of information gathering, exposing how data about you is being gathered every day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,40 $
-
-
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Auteur(s): Lester Evans
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? You’re not alone. Half-baked products and services that chip away at your sense of ownership, independence and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers.
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Date de publication: 2019-02-05
- Langue: Anglais
-
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
Reclaim Your Digital Gold
- How Your Personal Data Is Changing Business
- Auteur(s): Wayne Hinds
- Narrateur(s): Curt Caster
- Durée: 4 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
By understanding the profound power of personal data, listeners can take control of their digital lives, safeguard their privacy, and navigate the digital landscape with confidence. Empower yourself with knowledge. Get your copy of the book today to discover the transformative power of personal data and take control of your digital life.
-
-
Informative
- Écrit par Thomas Donovan le 2025-02-16
-
Reclaim Your Digital Gold
- How Your Personal Data Is Changing Business
- Narrateur(s): Curt Caster
- Durée: 4 h et 35 min
- Date de publication: 2025-02-13
- Langue: Anglais
-
By understanding the profound power of personal data, listeners can take control of their digital lives, safeguard their privacy, and navigate the digital landscape with confidence. Empower yourself with knowledge.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
Cybersecurity Guard
- Unlocking the Secrets to Detect, Prevent, and Shield Your Devices from Cyber Threats and Scams
- Auteur(s): Joseph Mendoza
- Narrateur(s): Shania Lynn
- Durée: 3 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you overwhelmed by the endless news of data breaches and cyber threats? Do you find yourself lost amidst technical jargon that sounds more like a script from a futuristic movie? Does the idea of defending your digital presence from invisible threats seem like an impossible task? Here's a bold truth: You don't need to be a tech whiz to master cybersecurity essentials. In fact, you're only one book away from transforming your digital life and securing your personal and professional information against the dark forces of the cyber world.
-
Cybersecurity Guard
- Unlocking the Secrets to Detect, Prevent, and Shield Your Devices from Cyber Threats and Scams
- Narrateur(s): Shania Lynn
- Durée: 3 h et 51 min
- Date de publication: 2024-08-26
- Langue: Anglais
-
Navigate the Digital Seas and Safeguard Your Online World in Just 7 Days, Even if Cybersecurity Sounds Like a Foreign Language to You.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- Auteur(s): Alsden Keir
- Narrateur(s): Darren Guido
- Durée: 1 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends. Communicating through screens has become so common that most of us don’t even think twice before opening a message, clicking a link, or responding to a notification. But in that sea of normal communication lies something much more dangerous: messages designed to trick you, to make you give away your passwords, financial details, or other private information. These scams often come hidden in the very tools we trust most—email and text.
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- Narrateur(s): Darren Guido
- Durée: 1 h et 20 min
- Date de publication: 2025-05-27
- Langue: Anglais
-
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Date de publication: 2021-01-14
- Langue: Anglais
-
The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
CompTIA CASP+ Certification
- The Ultimate Study Guide to Master the Advanced Security Practitioner Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Unravel the intricate layers of modern cybersecurity with the comprehensive guide to the CompTIA CASP+ Certification Advanced Security Practitioner. Dive into the depths of this dynamic field as this book becomes your companion in mastering the multifaceted world of digital defense. This guide will equip both novice and seasoned professionals with the arsenal needed to fortify their expertise. Each chapter serves as a gateway into a domain crucial for fortifying networks, mitigating risks, and mastering advanced security practices.
-
CompTIA CASP+ Certification
- The Ultimate Study Guide to Master the Advanced Security Practitioner Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 17 min
- Date de publication: 2024-01-10
- Langue: Anglais
-
Unravel the intricate layers of modern cybersecurity with the comprehensive guide to the CompTIA CASP+ Certification Advanced Security Practitioner. Dive into the depths of this dynamic field as this book becomes your companion in mastering the multifaceted world of digital defense....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $
-
-
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Auteur(s): Andy Greenberg
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Date de publication: 2012-09-17
- Langue: Anglais
- The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,04 $
-
-
-
Invisibility Toolkit
- 100 Ways to Disappear and How to Be Anonymous From Oppressive Governments, Stalkers & Criminals
- Auteur(s): Lance Henderson
- Narrateur(s): James C. Lewis
- Durée: 2 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Your sovereignty is under attack. You don't need the red pill to see it because you've already been unplugged. It's all around you. Within this audiobook lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever.
-
Invisibility Toolkit
- 100 Ways to Disappear and How to Be Anonymous From Oppressive Governments, Stalkers & Criminals
- Narrateur(s): James C. Lewis
- Durée: 2 h et 28 min
- Date de publication: 2015-10-02
- Langue: Anglais
- Within this audiobook lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34 $
-
-
-
Attack Surface Management
- Strategies and Techniques for Safeguarding Your Digital Assets
- Auteur(s): MJ Kaufmann, Ron Eddings
- Narrateur(s): Dean Gallagher
- Durée: 10 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Authors Ron Eddings and MJ Kaufmann offer actionable solutions for newcomers and experts alike, using machine learning and AI techniques. ASM helps you routinely assess digital assets to gain complete insight into vulnerabilities, and potential threats.
-
Attack Surface Management
- Strategies and Techniques for Safeguarding Your Digital Assets
- Narrateur(s): Dean Gallagher
- Durée: 10 h
- Date de publication: 2025-07-29
- Langue: Anglais
-
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,53 $
-
-
-
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Auteur(s): Zeynep Tufekci
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
An incisive observer, writer, and participant in today's social movements, Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests, and why they have difficulty persisting in their long-term quests for change.
-
-
A must read for those interested in social media
- Écrit par Bijan le 2018-09-13
-
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Date de publication: 2017-05-16
- Langue: Anglais
- Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26 $
-
-
-
Digital Privacy: Internet Security to Stop Big Companies from Tracking and Selling Your Data
- Auteur(s): Eric Faster, Chris Capra
- Narrateur(s): Skyler Morgan
- Durée: 3 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Your data has already been sold...Get it back. There are so many times when we are online, and we need to make sure that our data is safe. We assume that we are doing a good job with a bit of anti-virus protection and carefully selecting what sites we visit. But when some of the big companies we trust, including Facebook, Google, and more, are willing to gather up as much data as they can about all our lives (whether online or not) and then sell it make money, it’s hard to know how safe our information really is.
-
Digital Privacy: Internet Security to Stop Big Companies from Tracking and Selling Your Data
- Narrateur(s): Skyler Morgan
- Durée: 3 h et 17 min
- Date de publication: 2020-10-12
- Langue: Anglais
-
Your data has already been sold...Get it back. There are so many times when we are online, and we need to make sure that our data is safe. We assume that we are doing a good job with a bit of anti-virus protection and carefully selecting what sites we visit....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-