Internet Security
-
-
Well Aware
- Master the Nine Cybersecurity Habits to Protect Your Future
- Auteur(s): George Finney
- Narrateur(s): Brett Barry
- Durée: 6 h et 33 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Well Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it’s a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered - literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception - drawn from knowledge the author has acquired during two decades of experience in cybersecurity. By implementing these habits and changing our behaviors, we can combat most security problems.
-
Well Aware
- Master the Nine Cybersecurity Habits to Protect Your Future
- Narrateur(s): Brett Barry
- Durée: 6 h et 33 min
- Date de publication: 2020-12-07
- Langue: Anglais
-
Well Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it’s a people problem....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,15 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security
- Small Business: A Hacker's Playground
- Auteur(s): Jason L. Rorie
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 45 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This audiobook is for small business owners. My goal is to get small business owners out of the mindset that cyber threats are too big for their business. This is never the right mindset to keep because an attack can and will happen to you if you don’t have the proper cyber security in place. You have to put protection methods in place to keep your business safe in today’s cyber world.
-
Cyber Security
- Small Business: A Hacker's Playground
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 45 min
- Date de publication: 2020-01-08
- Langue: Anglais
-
This audiobook is for small business owners. My goal is to get small business owners out of the mindset that cyber threats are too big for their business....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Como enfrentar o ódio [How to Face Hatred]
- A internet e a luta pela democracia [Internet and the Fight for Democracy]
- Auteur(s): Felipe Neto
- Narrateur(s): Felipe Neto
- Durée: 12 h et 38 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Ainda em 2009, Felipe Neto se tornou um fenômeno da internet no país. Seu conteúdo, agressivo mas bem-humorado, se direcionava inicialmente às tendências da época, mas logo se voltou também à política, em especial ao governo do Partido dos Trabalhadores (PT). No entanto, com o impeachment da ex-presidenta Dilma Rousseff, a crescente aproximação da extrema direita ao poder e o recrudescimento de discursos de ódio contra minorias, Felipe passou a questionar suas convicções.
-
Como enfrentar o ódio [How to Face Hatred]
- A internet e a luta pela democracia [Internet and the Fight for Democracy]
- Narrateur(s): Felipe Neto
- Durée: 12 h et 38 min
- Date de publication: 2025-02-27
- Langue: Portugais
-
Ainda em 2009, Felipe Neto se tornou um fenômeno da internet no país. Seu conteúdo, agressivo mas bem-humorado, se direcionava inicialmente às tendências da época, mas logo se voltou também à política, em especial ao governo do Partido dos Trabalhadores (PT).
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,39 $ ou gratuit avec l'essai de 30 jours
-
-
-
Big Tech Tyrants
- How Silicon Valley's Stealth Practices Addict Teens, Silence Speech and Steal Your Privacy
- Auteur(s): Floyd Brown, Todd Cefaratti
- Narrateur(s): Shawn Compton
- Durée: 8 h et 49 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Big Tech Tyrants boast riches beyond emperors of old but act like juveniles who don't want to grow up. They are modern-day robber barons. Big Tech Tyrants don't know the meaning of privacy, when it comes to you. They try to make you believe they will give their products away for free as a service to society, when really, they are vacuuming your personal data. They use this data to discover your deepest secrets. Big Tech Tyrants is an eye-opening, must-listen book for anyone living in the 21st century.
-
-
We Live in "1984"
- Écrit par Jake L.S. le 2019-09-04
-
Big Tech Tyrants
- How Silicon Valley's Stealth Practices Addict Teens, Silence Speech and Steal Your Privacy
- Narrateur(s): Shawn Compton
- Durée: 8 h et 49 min
- Date de publication: 2019-09-03
- Langue: Anglais
-
"Boy Kings," or Big Tech Tyrants, are considered the most powerful individuals in the world. They're the autocratic aristocrats who run the tech giants in Silicon Valley, and these social platform operators have gained a non-elected (or, should we say, a self-elected) authoritarian power....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- Auteur(s): Dana Onyshko
- Narrateur(s): Gary Westphalen, Jon Bratton
- Durée: 5 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management. Do you feel that cyber security is indispensable in todays digital-dependent world? Do you want to introduce yourself to the world of cyber security but are easily overwhelmed or not sure where to start? Are you concerned about your own digital devices and networks, do you suspect they may be hacked or reporting information about your daily habits to unknown databases?
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- Narrateur(s): Gary Westphalen, Jon Bratton
- Durée: 5 h et 40 min
- Date de publication: 2024-04-19
- Langue: Anglais
-
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Auteur(s): Niels Starling
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security. We all think our information is at risk when actually hiding it away runs the greatest risk.
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Date de publication: 2020-12-16
- Langue: Anglais
-
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Power to Change
- Understanding Bullying and Creating Safe Spaces for Our Children
- Auteur(s): Juan Rodriguez Aceves
- Narrateur(s): Mike Hennessy
- Durée: 3 h et 24 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In The Power to Change: Understanding Bullying and Creating Safe Spaces for Our Children, renowned youth advocate Juan Rodriguez Aceves draws from decades of experience to illuminate the complex dynamics of bullying and provide practical, proven solutions for lasting change. Through compelling narratives and evidence-based strategies, he reveals how bullying evolved in the digital age and why traditional approaches often fall short.
-
The Power to Change
- Understanding Bullying and Creating Safe Spaces for Our Children
- Narrateur(s): Mike Hennessy
- Durée: 3 h et 24 min
- Date de publication: 2025-08-18
- Langue: Anglais
-
In The Power to Change, Juan Rodriguez Aceves draws from experience to illuminate the dynamics of bullying and provide solutions for lasting change. Through narratives and evidence-based strategies, he reveals how bullying evolved in the digital age and why traditional approaches often fall short.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Bundle: 4 Books in One
- The World of Cybersecurity - Cybersecurity for Small Business - Is Cyber Deterrence Possible? - Cybersecurity Career Path
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 4 h et 23 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As the times have shifted in the last decade or so, we have started to depend more and more upon our computers as well as other electronic devices for our needs. The United States’ reliance on networked systems and the high costs associated with cyber attacks have led many leaders in the US government and the Department of Defense (DOD) to prioritize protecting our critical networked infrastructure. Part of that focus is trying to develop a strategy for deterring adversaries from attacking our networks in the first place.
-
Cybersecurity Bundle: 4 Books in One
- The World of Cybersecurity - Cybersecurity for Small Business - Is Cyber Deterrence Possible? - Cybersecurity Career Path
- Narrateur(s): Tom Brooks
- Durée: 4 h et 23 min
- Date de publication: 2021-06-09
- Langue: Anglais
-
As the times have shifted in the last decade or so, we have started to depend more and more upon our computers as well as other electronic devices for our needs. It's only natural for you to worry about your own safety when you know the extent of the dependency upon technology around you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
No Safe Harbor
- The Inside Truth About Cybercrime - and How to Protect Your Business
- Auteur(s): Mark Sangster
- Narrateur(s): Kevin Stillwell
- Durée: 5 h et 27 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster tells listeners that cybersecurity is not an IT problem to solve - it is a business risk to manage.
-
No Safe Harbor
- The Inside Truth About Cybercrime - and How to Protect Your Business
- Narrateur(s): Kevin Stillwell
- Durée: 5 h et 27 min
- Date de publication: 2020-12-11
- Langue: Anglais
-
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital Life Skills for Youth
- A Guide for Parents, Guardians, and Educators (Reference Series)
- Auteur(s): Angela Crocker
- Narrateur(s): Peter Williams
- Durée: 4 h et 57 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Raising, teaching, and guiding kids is a tough job. They need to be taught basic skills such as how to cross the road, boil water, and read in order to get by in life. To make things tougher, these days, tweens and teens also need to be taught digital life skills. But in this digital age, how do you protect kids on the internet? Today’s youth have access to more technology and information than any previous generation.
-
Digital Life Skills for Youth
- A Guide for Parents, Guardians, and Educators (Reference Series)
- Narrateur(s): Peter Williams
- Durée: 4 h et 57 min
- Date de publication: 2020-10-20
- Langue: Anglais
-
Raising, teaching, and guiding kids is a tough job. They need to be taught basic skills such as how to cross the road, boil water, and read in order to get by in life. To make things tougher, these days, tweens and teens also need to be taught digital life skills....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Beginners: 3 Books in 1
- What You Must Know About Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
- Auteur(s): Attila Kovacs
- Narrateur(s): Matyas J
- Durée: 5 h et 47 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In this audiobook you will learn: What types of roles exist in the field of Cybersecurity, what key concepts and methodologies you must learn in Cybersecurity, what are the key technologies that you should be aware, how to get started in the field of Cybersecurity, what kind of Cybersecurity entry level salary you can expect, how to overcome obstructions and get things done, how to become a project oriented security professional, what kind of mindset you must have in Cybersecurity, how to express your unique voice in Cybersecurity, and much more!
-
Cybersecurity for Beginners: 3 Books in 1
- What You Must Know About Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
- Narrateur(s): Matyas J
- Série: Cybersecurity for Beginners
- Durée: 5 h et 47 min
- Date de publication: 2020-04-10
- Langue: Anglais
-
In this audiobook you will learn: What types of roles exist in the field of Cybersecurity, what key concepts and methodologies you must learn in Cybersecurity, what are the key technologies that you should be aware, how to get started in the field of Cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity
- What You Need to Know About Cybersecurity, Ethical Hacking, Risk Assessment, Social Engineering & How to Defend Yourself from Attacks
- Auteur(s): Ralph Voss
- Narrateur(s): James Powell
- Durée: 4 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyber Security may sound like something very complex. However, this book takes a simple, easy to understand approach to breakdown complex topics so that you can understand better and take appropriate action to protect your information once you finish listening.
-
Cybersecurity
- What You Need to Know About Cybersecurity, Ethical Hacking, Risk Assessment, Social Engineering & How to Defend Yourself from Attacks
- Narrateur(s): James Powell
- Durée: 4 h et 12 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
Cyber Security may sound like something very complex. However, this book takes a simple, easy to understand approach to breakdown complex topics so that you can understand better and take appropriate action to protect your information once you finish listening....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Your Safety and Privacy Online: The CIA and NSA
- Auteur(s): Siggi Bjarnason
- Narrateur(s): Becky White
- Durée: 4 h et 27 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them. My goal is to explain online threats in terms that don't require a technical background to understand. All techno-speak will be limited, and where it cannot be avoided, I will first explain them in common, non-technical terms.
-
Your Safety and Privacy Online: The CIA and NSA
- Narrateur(s): Becky White
- Durée: 4 h et 27 min
- Date de publication: 2019-11-22
- Langue: Anglais
-
The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- Auteur(s): Kip Boyle
- Narrateur(s): Kip A. Boyle
- Durée: 5 h et 14 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- Narrateur(s): Kip A. Boyle
- Durée: 5 h et 14 min
- Date de publication: 2019-09-14
- Langue: Anglais
-
With this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Machine Learning: Your Ultimate Guide on Machine Learning, Agile Project Management, and Hacking
- A Three-Book Bundle
- Auteur(s): Robert Keane
- Narrateur(s): Mike Davis
- Durée: 4 h et 27 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
Your ultimate guide on machine learning, agile project management, and hacking. This audiobook includes three manuscripts! Machine learning, agile project management, and hacking are vital to the world of information technology and have changed drastically in recent years. This guidebook has all the information that you need to learn about some of the most common applications and attacks in the world today as well as some of the things that you can do to protect and educate yourself.
-
Machine Learning: Your Ultimate Guide on Machine Learning, Agile Project Management, and Hacking
- A Three-Book Bundle
- Narrateur(s): Mike Davis
- Durée: 4 h et 27 min
- Date de publication: 2018-01-16
- Langue: Anglais
-
Your ultimate guide on machine learning, agile project management, and hacking. This audiobook includes three manuscripts....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Audacity to Spy
- How Government, Business, and Hackers Rob Us of Privacy
- Auteur(s): Catherine Nolan, Ashley M. Wilson JD
- Narrateur(s): Randal Schaffer
- Durée: 4 h et 14 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources.
-
The Audacity to Spy
- How Government, Business, and Hackers Rob Us of Privacy
- Narrateur(s): Randal Schaffer
- Durée: 4 h et 14 min
- Date de publication: 2016-08-11
- Langue: Anglais
- The Audacity to Spy reveals the ways in which your identity and personal data have been stolen by various sources....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ransom War
- How Cyber Crime Became a Threat to National Security
- Auteur(s): Max Smeets
- Narrateur(s): Walter Dixon
- Durée: 6 h et 24 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This timely book explores the alarming rise of ransomware: malicious software blocking users from their systems or data until they've paid money to regain access or to prevent the release of sensitive information. High-profile British examples of the twenty-first century have targeted national libraries and healthcare organizations; in the US, hackers of Pennsylvania's Lehigh Valley Health Network held patient data hostage—when their demands went unmet, they published topless photographs of women with breast cancer.
-
Ransom War
- How Cyber Crime Became a Threat to National Security
- Narrateur(s): Walter Dixon
- Durée: 6 h et 24 min
- Date de publication: 2025-05-27
- Langue: Anglais
-
This timely book explores the alarming rise of ransomware: malicious software blocking users from their systems or data until they've paid money to regain access or to prevent the release of sensitive information.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2023-06-12
- Langue: Anglais
-
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Date de publication: 2021-01-14
- Langue: Anglais
-
The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybercrime
- Top 10 Things You Need to Know About It
- Auteur(s): Sabian Gralden
- Narrateur(s): Chris Reynolds
- Durée: 2 h et 13 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This book is your guided tour through the digital underworld. In ten clear, accessible chapters, we explore the most common and dangerous forms of cybercrime. From phishing emails that trick the unwary into giving up passwords, to ransomware that can shut down entire hospitals or school systems, each chapter lifts the veil on a different threat. We explain how the attack works, who tends to be behind it, what kind of damage it causes, and how to protect yourself and your organization.
-
Cybercrime
- Top 10 Things You Need to Know About It
- Narrateur(s): Chris Reynolds
- Série: Con Men, Scams, Phishing and other Disgusting Practices and How to Get Ahead of Them, Livre 6
- Durée: 2 h et 13 min
- Date de publication: 2025-09-22
- Langue: Anglais
-
This book is a tour through the digital underworld. In ten chapters, we explore the most common and dangerous forms of cybercrime. From phishing emails that trick the unwary into giving up passwords to ransomware that can shut down entire systems, each chapter lifts the veil on a different threat.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-