Internet Security
-
-
Quality Assurance + Cryptography + Hacking
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 30 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Is quality assurance what you want to learn? Always wondered how one becomes a better software developer? Does it interest you how to achieve this quickly? Purchase Quality Assurance to discover everything you need to know about testing and software quality!
-
Quality Assurance + Cryptography + Hacking
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 30 min
- Date de publication: 2016-06-28
- Langue: Anglais
- Purchase Quality Assurance to discover everything you need to know about testing and software quality....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Auteur(s): David Senecal
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves. The author uses plain language to lift the veil on bots and fraud, making a topic critical to your website's security easy to understand and even easier to implement.
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Date de publication: 2024-08-27
- Langue: Anglais
-
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Understanding Cryptography
- The Basic Science of Keeping Secrets Safe
- Auteur(s): Revin Laxtor
- Narrateur(s): Alejandro Cordoba
- Durée: 1 h et 53 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Cryptography is the science of keeping information secret and secure. It’s one of the oldest and most fascinating fields in human history. Long before computers, satellites, and smartphones, people were using secret codes to share information that had to be kept away from prying eyes. From ancient Egyptian hieroglyphics to encrypted war plans during World War II, the desire to keep secrets safe has always been a part of human life. But cryptography isn’t just a subject for history books or spy movies. Today, cryptography is all around us.
-
Understanding Cryptography
- The Basic Science of Keeping Secrets Safe
- Narrateur(s): Alejandro Cordoba
- Durée: 1 h et 53 min
- Date de publication: 2025-07-14
- Langue: Anglais
-
Cryptography is the science of keeping information secret and secure. It’s one of the oldest and most fascinating fields in human history. Long before computers, satellites, and smartphones, people were using secret codes to share information that had to be kept away from prying eyes.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
We Have Root
- Even More Advice from Schneier on Security
- Auteur(s): Bruce Schneier
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Version intégrale
-
Au global4.5 out of 5 stars 2
-
Performance4.5 out of 5 stars 2
-
Histoire5 out of 5 stars 2
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments.
-
We Have Root
- Even More Advice from Schneier on Security
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Date de publication: 2019-11-08
- Langue: Anglais
-
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
28,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Internet Privacy
- A Basic Look at Just How Secure Your Personal Data Is Online
- Auteur(s): Trevor Clinger
- Narrateur(s): Juan G. Molinari
- Durée: 9 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
As technology advances, it would be ignorant and foolish to ignore the importance of the Internet in our lives. Along with the Internet comes the human right to browse it in privacy. Internet privacy is a serious thing: It has the potential to ruin lives if it is breached. Lives can be ruined through monetary loss, reputation loss, and identity theft, among other ways. This audiobook gives you a basic understanding of Internet privacy and lets you know just how protected or how unprotected you actually are.
-
Internet Privacy
- A Basic Look at Just How Secure Your Personal Data Is Online
- Narrateur(s): Juan G. Molinari
- Durée: 9 min
- Date de publication: 2015-04-01
- Langue: Anglais
- As technology advances, it would be ignorant and foolish to ignore the importance of the Internet in our lives. Internet privacy is a serious thing: It has the potential to ruin lives if it is breached....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- Auteur(s): Scott N. Schober, Craig W. Schober
- Narrateur(s): Stephen Bowlby
- Durée: 7 h et 15 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now, joined by his brother Craig, the two have set their sights on the biggest target of all: small businesses. Throughout Cybersecurity Is Everybody's Business, Scott and Craig contextualize the impact of these cyber attacks on your small business and daily lives to provide expert insight and a plan of attack for fending off future security breaches.
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- Narrateur(s): Stephen Bowlby
- Durée: 7 h et 15 min
- Date de publication: 2019-10-22
- Langue: Anglais
-
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Darknet
- Schmuddelecke oder letzter Freiraum des Internets?
- Auteur(s): Kai Laufen
- Narrateur(s): Isabelle Demey, Martin Ruthenberg
- Durée: 27 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Die Internetseite Silk Road vertreibt Cannabis, Kokain und Amphetamine. Die Webseite ist Teil des sogenannten Darknets, also eines weitläufigen Bereichs des Internets, das nicht jedem unbedarften Nutzer zugänglich ist. Denn viele Darknet-Seiten sind nur für eingeladene Mitglieder oder über eine spezielle Technik erreichbar: TOR.
-
Darknet
- Schmuddelecke oder letzter Freiraum des Internets?
- Narrateur(s): Isabelle Demey, Martin Ruthenberg
- Durée: 27 min
- Date de publication: 2014-02-21
- Langue: Allemand
- Die Internetseite Silk Road vertreibt Cannabis, Kokain und Amphetamine. Die Webseite ist Teil des sogenannten Darknets...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
2,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Power to Change
- Understanding Bullying and Creating Safe Spaces for Our Children
- Auteur(s): Juan Rodriguez Aceves
- Narrateur(s): Mike Hennessy
- Durée: 3 h et 24 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In The Power to Change: Understanding Bullying and Creating Safe Spaces for Our Children, renowned youth advocate Juan Rodriguez Aceves draws from decades of experience to illuminate the complex dynamics of bullying and provide practical, proven solutions for lasting change. Through compelling narratives and evidence-based strategies, he reveals how bullying evolved in the digital age and why traditional approaches often fall short.
-
The Power to Change
- Understanding Bullying and Creating Safe Spaces for Our Children
- Narrateur(s): Mike Hennessy
- Durée: 3 h et 24 min
- Date de publication: 2025-08-18
- Langue: Anglais
-
In The Power to Change, Juan Rodriguez Aceves draws from experience to illuminate the dynamics of bullying and provide solutions for lasting change. Through narratives and evidence-based strategies, he reveals how bullying evolved in the digital age and why traditional approaches often fall short.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
What Stays in Vegas
- The World of Personal Data - Lifeblood of Big Business - and the End of Privacy as We Know It
- Auteur(s): Adam Tanner
- Narrateur(s): John McLain
- Durée: 9 h et 9 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers, and other firms are voraciously gathering data with little oversight from anyone. In Las Vegas, no company knows the value of data better than Caesars Entertainment. Many thousands of enthusiastic clients pour through the ever-open doors of their casinos. The secret to the company’s success lies in their one unrivaled asset: they know their clients intimately by tracking the activities of the overwhelming majority of gamblers.
-
What Stays in Vegas
- The World of Personal Data - Lifeblood of Big Business - and the End of Privacy as We Know It
- Narrateur(s): John McLain
- Durée: 9 h et 9 min
- Date de publication: 2014-09-02
- Langue: Anglais
- The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers, and other firms are voraciously gathering data with little oversight from anyone....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
9,34 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity: Testimony Before the Committee on Transportation and Infrastructure, House of Representatives
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Thank you for the opportunity to contribute to today’s discussion on federal perspectives to secure the nation’s infrastructure. As you know, our nation’s critical infrastructure sectors are dependent on information technology (IT) systems and digital data to carry out operations and to process, maintain, and report essential information. The security of these systems and data is vital to public confidence and national security, prosperity, and well-being.
-
Cybersecurity: Testimony Before the Committee on Transportation and Infrastructure, House of Representatives
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Date de publication: 2021-12-21
- Langue: Anglais
-
Thank you for the opportunity to contribute to today’s discussion on federal perspectives to secure the nation’s infrastructure. As you know, our nation’s critical infrastructure sectors are dependent on information technology (IT) systems and digital data to carry out operations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Future of Reputation
- Gossip, Rumor, and Privacy on the Internet
- Auteur(s): Daniel J. Solove
- Narrateur(s): Jeff Wilson
- Durée: 8 h et 24 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
This engrossing book explores the profound implications of personal information on the Internet, preserved forever even if it is false, biased, or humiliating. Brimming with examples of online gossip, slander, and rumor, the book discusses the tensions between privacy and free speech and proposes how to balance the two. What information about you is on the Internet?
-
The Future of Reputation
- Gossip, Rumor, and Privacy on the Internet
- Narrateur(s): Jeff Wilson
- Durée: 8 h et 24 min
- Date de publication: 2010-03-10
- Langue: Anglais
- This engrossing book explores the profound implications of personal information on the Internet, preserved forever even if it is false, biased, or humiliating....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,52 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Warfare in 2022
- Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates
- Auteur(s): Michael A. Goedeker MSc
- Narrateur(s): Mandy Grant-Grierson
- Durée: 3 h et 19 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
It’s 2022. Do you know if your online information is safe? According to a study by the University of Maryland, hackers attack internet-connected computers every 39 seconds. The same technology that’s made information sharing easier has put our privacy at risk more than ever. But it doesn’t stop there. International warfare is now waged on the digital stage, changing how countries influence global conflicts' outcomes. We live in an era of computers, data, and digital connections. This book will give you a better understanding of the current threats and solutions from the world of cyber warfare.
-
Cyber Warfare in 2022
- Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates
- Narrateur(s): Mandy Grant-Grierson
- Durée: 3 h et 19 min
- Date de publication: 2023-11-18
- Langue: Anglais
-
We live in an era of computers, data, and digital connections. This book will give you a better understanding of the current threats and solutions from the world of cyber warfare....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,09 $ ou gratuit avec l'essai de 30 jours
-
-
-
Sinister Shackles
- Understanding Ransomware: Data Encryption and Extortion
- Auteur(s): Logan Lockwood
- Narrateur(s): Sean P. Chapman
- Durée: 1 h et 39 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Arm yourself with proactive measures and best practices to fortify your defenses. With this invaluable knowledge, you will be equipped to safeguard your organization and ensure its resilience in the face of this ever-present danger. The time to act is now—protect your business from the relentless onslaught of ransomware and its sinister shackles.
-
Sinister Shackles
- Understanding Ransomware: Data Encryption and Extortion
- Narrateur(s): Sean P. Chapman
- Durée: 1 h et 39 min
- Date de publication: 2023-08-14
- Langue: Anglais
-
Arm yourself with proactive measures and best practices to fortify your defenses. With this invaluable knowledge, you will be equipped to safeguard your organization and ensure its resilience in the face of this ever-present danger....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Cybersecurity experts agree: No one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls.
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2022-01-14
- Langue: Anglais
-
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Click with Caution
- 10 Online Red Flags That Scream ‘Scam!’ (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 2)
- Auteur(s): Alsden Kier
- Narrateur(s): stephen plaushin
- Durée: 1 h et 41 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
The internet has transformed our world in amazing ways. With just a few clicks, we can talk to friends on the other side of the globe, discover new music, explore our favorite hobbies, shop for just about anything, and even take entire college courses from the comfort of our couch. It’s no exaggeration to say that the internet is one of the greatest tools ever invented. But just like in the real world, not everyone you meet online has good intentions. Hidden among the games, chats, and cute cat videos are people who spend their time trying to trick others.
-
Click with Caution
- 10 Online Red Flags That Scream ‘Scam!’ (Con Men, Scams, Phishing and Other Disgusting Practices and How to Get Ahead of Them, Book 2)
- Narrateur(s): stephen plaushin
- Série: Con Men, Scams, Phishing and other Disgusting Practices and How to Get Ahead of Them, Livre 2
- Durée: 1 h et 41 min
- Date de publication: 2025-06-03
- Langue: Anglais
-
The internet has transformed our world in amazing ways. With just a few clicks, we can talk to friends on the other side of the globe, discover new music, explore our favorite hobbies, shop for just about anything, and even take entire college courses from the comfort of our couch.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- Auteur(s): Alsden Keir
- Narrateur(s): Darren Guido
- Durée: 1 h et 20 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends. Communicating through screens has become so common that most of us don’t even think twice before opening a message, clicking a link, or responding to a notification. But in that sea of normal communication lies something much more dangerous: messages designed to trick you, to make you give away your passwords, financial details, or other private information. These scams often come hidden in the very tools we trust most—email and text.
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- Narrateur(s): Darren Guido
- Durée: 1 h et 20 min
- Date de publication: 2025-05-27
- Langue: Anglais
-
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Censorship's Grave
- Observations, Tools, and Tips for Taking the Internet Back from Autocracies
- Auteur(s): Philip Collier
- Narrateur(s): Philip G Collier
- Durée: 4 h et 5 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Censorship's Grave looks at modern methods of circumventing censorship and counteracting effects of information warfare. It argues that autocrats are losing the battle of censorship in an information age they no longer control. Unfortunately, the new information age contains a spectrum of arguments - from truth to blatant lies. The book was written by an author who has traveled extensively in countries with restricted media and used circumvention tools in all of them. It conveys a warning to not trade one disinfo system for another one.
-
Censorship's Grave
- Observations, Tools, and Tips for Taking the Internet Back from Autocracies
- Narrateur(s): Philip G Collier
- Durée: 4 h et 5 min
- Date de publication: 2023-05-11
- Langue: Anglais
-
Censorship's Grave looks at modern methods of circumventing censorship and counteracting effects of information warfare. It argues that autocrats are losing the battle of censorship in an information age they no longer control.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- Auteur(s): Noah Zhang
- Narrateur(s): Gary Westphalen
- Durée: 2 h et 1 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Our society has become saturated with internet-connected devices and trackers everywhere. From home routers to your mobile phones, most people are easily hacked if targeted. In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual.
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- Narrateur(s): Gary Westphalen
- Durée: 2 h et 1 min
- Date de publication: 2019-10-17
- Langue: Anglais
-
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cloud Security Career Handbook
- A Beginner's Guide to Starting and Succeeding in Cloud Security
- Auteur(s): Timothy Isle
- Narrateur(s): Brent Caraway
- Durée: 2 h et 45 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Cloud security is one of the hottest fields around, with the global cloud market expected to become a multi-billion-dollar industry by 2030. The demand for cloud security professionals is at an all-time high, and now is the best time to take that next step in your cybersecurity career!
-
Cloud Security Career Handbook
- A Beginner's Guide to Starting and Succeeding in Cloud Security
- Narrateur(s): Brent Caraway
- Durée: 2 h et 45 min
- Date de publication: 2023-06-14
- Langue: Anglais
-
Cloud security is one of the hottest fields around, with the global cloud market expected to become a multi-billion-dollar industry by 2030. The demand for cloud security professionals is at an all-time high, and now is the best time to take that next step in your cybersecurity career....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-