Internet Security
-
-
Black Code
- Surveillance, Privacy, and the Dark Side of the Internet (Expanded Edition)
- Auteur(s): Ronald J. Deibert
- Narrateur(s): Ronald J. Deibert
- Durée: 9 h et 13 min
- Version intégrale
-
Au global5
-
Performance2
-
Histoire2
Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain. In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what's at stake for Internet users and citizens.
Aperçu -
Black Code
- Surveillance, Privacy, and the Dark Side of the Internet (Expanded Edition)
- Narrateur(s): Ronald J. Deibert
- Durée: 9 h et 13 min
- Date de publication: 2017-09-04
- Langue: Anglais
- Cyberspace is all around us. We depend on it for everything we do....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,89 $ ou gratuit avec l'essai de 30 jours
-
-
-
NSA Secrets
- Government Spying in the Internet Age
- Auteur(s): The Washington Post
- Narrateur(s): James Adams
- Durée: 6 h et 20 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
The NSA's extensive surveillance program has riveted America as the public questions the threats to their privacy. As reported by The Washington Post, in their Pulitzer Prize-winning coverage of whistleblower Edward Snowden's NSA leaks, NSA Secrets delves into the shadowy world of information gathering, exposing how data about you is being gathered every day. From his earliest encrypted exchanges with reporters, Edward Snowden knew he was a man in danger.
Aperçu -
NSA Secrets
- Government Spying in the Internet Age
- Narrateur(s): James Adams
- Durée: 6 h et 20 min
- Date de publication: 2015-01-13
- Langue: Anglais
- NSA Secrets delves into the shadowy world of information gathering, exposing how data about you is being gathered every day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
19,86 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Networking
- An All-in-One Beginner's Guide to Understanding Communications Systems, Network Security, Internet Connections, Cybersecurity and Hacking
- Auteur(s): Quinn Kiser
- Narrateur(s): Ivan Busenius
- Durée: 3 h et 28 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area.
Aperçu -
Computer Networking
- An All-in-One Beginner's Guide to Understanding Communications Systems, Network Security, Internet Connections, Cybersecurity and Hacking
- Narrateur(s): Ivan Busenius
- Durée: 3 h et 28 min
- Date de publication: 2020-08-07
- Langue: Anglais
-
This audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- Auteur(s): Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Autres
- Narrateur(s): The Voice Gallery
- Durée: 8 h et 20 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
Aperçu -
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- Narrateur(s): The Voice Gallery
- Durée: 8 h et 20 min
- Date de publication: 2023-02-10
- Langue: Anglais
-
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,64 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Essentials
- Auteur(s): Charles J. Brooks, Christopher Grow, Philip Craig, Autres
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Awful as an e-book
- Écrit par Mac le 2021-07-25
Aperçu -
Cybersecurity Essentials
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Date de publication: 2018-10-30
- Langue: Anglais
-
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
28,13 $ ou gratuit avec l'essai de 30 jours
-
-
-
Amazon Web Services in Action
- Auteur(s): Andreas Wittig, Michael Wittig
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability.
Aperçu -
Amazon Web Services in Action
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Date de publication: 2018-12-12
- Langue: Anglais
-
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,12 $ ou gratuit avec l'essai de 30 jours
-
-
-
Fatal System Error
- The Hunt for the New Crime Lords Who Are Bringing Down the Internet
- Auteur(s): Joseph Menn
- Narrateur(s): Christian Rummel
- Durée: 8 h et 23 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia. His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers.
Aperçu -
Fatal System Error
- The Hunt for the New Crime Lords Who Are Bringing Down the Internet
- Narrateur(s): Christian Rummel
- Durée: 8 h et 23 min
- Date de publication: 2010-01-11
- Langue: Anglais
- In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,57 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
Aperçu -
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Date de publication: 2021-01-14
- Langue: Anglais
-
The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,33 $ ou gratuit avec l'essai de 30 jours
-
-
-
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Auteur(s): Zeynep Tufekci
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Version intégrale
-
Au global8
-
Performance5
-
Histoire5
An incisive observer, writer, and participant in today's social movements, Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests, and why they have difficulty persisting in their long-term quests for change.
-
-
A must read for those interested in social media
- Écrit par Bijan le 2018-09-13
Aperçu -
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Date de publication: 2017-05-16
- Langue: Anglais
- Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Vulnerable System
- The History of Information Security in the Computer Age
- Auteur(s): Andrew J. Stewart
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
Aperçu -
A Vulnerable System
- The History of Information Security in the Computer Age
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Date de publication: 2021-09-14
- Langue: Anglais
-
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,25 $ ou gratuit avec l'essai de 30 jours
-
-
-
If It's Smart, It's Vulnerable
- Auteur(s): Mikko Hypponen
- Narrateur(s): Rich Miller
- Durée: 7 h et 32 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
All our devices and gadgets—from our refrigerators to our home security systems—are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing.
Aperçu -
If It's Smart, It's Vulnerable
- Narrateur(s): Rich Miller
- Durée: 7 h et 32 min
- Date de publication: 2022-09-27
- Langue: Anglais
-
Veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
20,96 $ ou gratuit avec l'essai de 30 jours
-
-
-
Privacy's Defender
- My Thirty-Year Fight Against Digital Surveillance
- Auteur(s): Cindy Cohn
- Durée: 9 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Throughout her career, Cindy Cohn has been driven by a fundamental question: Can we still have private conversations if we live our lives online? Privacy’s Defender chronicles her thirty-year battle to protect our right to digital privacy and shows just how central this right is to all our other rights, including our ability to organize and make change in the world.
-
Privacy's Defender
- My Thirty-Year Fight Against Digital Surveillance
- Durée: 9 h
- Date de publication: 2026-03-10
- Langue: Anglais
-
A personal chronicle of three key legal privacy battles that have defined the digital age and shaped the internet as we know it.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,36 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Guard
- Unlocking the Secrets to Detect, Prevent, and Shield Your Devices from Cyber Threats and Scams
- Auteur(s): Joseph Mendoza
- Narrateur(s): Shania Lynn
- Durée: 3 h et 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Are you overwhelmed by the endless news of data breaches and cyber threats? Do you find yourself lost amidst technical jargon that sounds more like a script from a futuristic movie? Does the idea of defending your digital presence from invisible threats seem like an impossible task? Here's a bold truth: You don't need to be a tech whiz to master cybersecurity essentials. In fact, you're only one book away from transforming your digital life and securing your personal and professional information against the dark forces of the cyber world.
Aperçu -
Cybersecurity Guard
- Unlocking the Secrets to Detect, Prevent, and Shield Your Devices from Cyber Threats and Scams
- Narrateur(s): Shania Lynn
- Durée: 3 h et 53 min
- Date de publication: 2024-08-26
- Langue: Anglais
-
Navigate the Digital Seas and Safeguard Your Online World in Just 7 Days, Even if Cybersecurity Sounds Like a Foreign Language to You.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,33 $ ou gratuit avec l'essai de 30 jours
-
-
-
Defend Your Data: Cybersecurity Essentials for Everyone
- Practical Steps to Protect Your Digital Life and Safeguard Your Data
- Auteur(s): Ousmane Barry
- Narrateur(s): Snake Porter
- Durée: 3 h et 59 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Defend Your Data is a practical guide for anyone who wants to feel more confident and secure in the digital world. It walks you through the threats most people face today, why they work, and how to defend yourself with simple habits that make a real difference. You’ll learn how phishing, malware, ransomware, and social-engineering attacks actually unfold, and what steps you can take to protect your devices, accounts, home network, and personal information. The book breaks down complex ideas in a way that feels approachable, even if you don’t work in technology.
Aperçu -
Defend Your Data: Cybersecurity Essentials for Everyone
- Practical Steps to Protect Your Digital Life and Safeguard Your Data
- Narrateur(s): Snake Porter
- Durée: 3 h et 59 min
- Date de publication: 2026-01-05
- Langue: Anglais
-
Defend Your Data is a practical guide for anyone who wants to feel more confident and secure in the digital world. It walks you through the threats most people face today, why they work, and how to defend yourself with simple habits that make a real difference.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,33 $ ou gratuit avec l'essai de 30 jours
-
-
-
Defensive Security Handbook (2nd Edition)
- Best Practices for Securing Infrastructure
- Auteur(s): William F. Reyor III, Lee Brotherston, Amanda Berlin
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 11 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
Aperçu -
Defensive Security Handbook (2nd Edition)
- Best Practices for Securing Infrastructure
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 11 min
- Date de publication: 2024-11-26
- Langue: Anglais
-
This pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
24,33 $ ou gratuit avec l'essai de 30 jours
-
-
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Auteur(s): Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website.
Aperçu -
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,79 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Beginner’s Guide to Digital Prepping & Practical Cybersecurity
- Simple Steps to Protect Your Data, Prevent Hacking, and Secure Your Family Online (Preparedness Collection, Book 3)
- Auteur(s): Urban Readiness Collective, Silver Valley Publishing
- Narrateur(s): Ben Staab
- Durée: 2 h et 42 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Protect Your Digital Life in Minutes—Even If You’re Not Tech-Savvy! Every click, every login, and every online interaction exposes you to digital threats—identity theft, hacking, and scams that can compromise your personal and financial security. But what if protecting yourself was simpler than you thought?" A Beginner’s Guide to Digital Prepping & Practical Cybersecurity" cuts through the confusion, offering clear, step-by-step strategies to safeguard your accounts, secure your family’s digital footprint, and prevent cyber threats—without requiring advanced technical skills.
Aperçu -
A Beginner’s Guide to Digital Prepping & Practical Cybersecurity
- Simple Steps to Protect Your Data, Prevent Hacking, and Secure Your Family Online (Preparedness Collection, Book 3)
- Narrateur(s): Ben Staab
- Durée: 2 h et 42 min
- Date de publication: 2025-05-06
- Langue: Anglais
-
Protect Your Digital Life in Minutes—Even If You’re Not Tech-Savvy! Every click, every login, and every online interaction exposes you to digital threats—identity theft, hacking, and scams that can compromise your personal and financial security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
16,37 $ ou gratuit avec l'essai de 30 jours
-
-
-
Digital Privacy: Internet Security to Stop Big Companies from Tracking and Selling Your Data
- Auteur(s): Eric Faster, Chris Capra
- Narrateur(s): Skyler Morgan
- Durée: 3 h et 17 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Your data has already been sold...Get it back. There are so many times when we are online, and we need to make sure that our data is safe. We assume that we are doing a good job with a bit of anti-virus protection and carefully selecting what sites we visit. But when some of the big companies we trust, including Facebook, Google, and more, are willing to gather up as much data as they can about all our lives (whether online or not) and then sell it make money, it’s hard to know how safe our information really is.
Aperçu -
Digital Privacy: Internet Security to Stop Big Companies from Tracking and Selling Your Data
- Narrateur(s): Skyler Morgan
- Durée: 3 h et 17 min
- Date de publication: 2020-10-12
- Langue: Anglais
-
Your data has already been sold...Get it back. There are so many times when we are online, and we need to make sure that our data is safe. We assume that we are doing a good job with a bit of anti-virus protection and carefully selecting what sites we visit....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,11 $ ou gratuit avec l'essai de 30 jours
-
-
-
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Auteur(s): Heidi Boghosian
- Narrateur(s): Charles Hubble
- Durée: 7 h et 27 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities. No one is exempt from data mining: by owning a smartphone, or using social media or a credit card, we...
Aperçu -
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Narrateur(s): Charles Hubble
- Série: Myths Made in America
- Durée: 7 h et 27 min
- Date de publication: 2021-07-13
- Langue: Anglais
- An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities. No one is exempt from data mining: by owning a smartphone, or using social media or a credit card, we...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,89 $ ou gratuit avec l'essai de 30 jours
-
-
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Auteur(s): Jack Jones
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want, do what you want, and buy whatever you want. But there is so much more to the deep web than the Hollywood picture of a lawless frontier land. Sure, there are illicit elements to it. It can be a dangerous place if you don't know what you are doing. But, with all that, it should be remembered what the deep web is all about - it's about freedom of speech in a world of censorship and political correctness.
-
-
Provides some practical information
- Écrit par Mary-Anne le 2018-12-15
Aperçu -
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Date de publication: 2017-07-14
- Langue: Anglais
- It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want and buy whatever you want....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
9,77 $ ou gratuit avec l'essai de 30 jours
-