Internet Security
-
-
The Future of Reputation
- Gossip, Rumor, and Privacy on the Internet
- Auteur(s): Daniel J. Solove
- Narrateur(s): Jeff Wilson
- Durée: 8 h et 24 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This engrossing book explores the profound implications of personal information on the Internet, preserved forever even if it is false, biased, or humiliating. Brimming with examples of online gossip, slander, and rumor, the book discusses the tensions between privacy and free speech and proposes how to balance the two. What information about you is on the Internet?
-
The Future of Reputation
- Gossip, Rumor, and Privacy on the Internet
- Narrateur(s): Jeff Wilson
- Durée: 8 h et 24 min
- Date de publication: 2010-03-10
- Langue: Anglais
- This engrossing book explores the profound implications of personal information on the Internet, preserved forever even if it is false, biased, or humiliating....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,14 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Ultimate Cyber Security Guide for TikTok Everyday Users, Influencers and Content Creators
- The First Ever Guide Dedicated to Protecting Your Presence and Privacy on TikTok
- Auteur(s): WeCyberYou!
- Narrateur(s): AJ Collins
- Durée: 1 h et 35 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This audiobook is for you. It has been narrated specially for all TikTok Everyday Users, Influencers and Content Creators around the world. We’ll show you how you can make the most of TikTok – safely and securely! You’ll find the knowledge and guidance you need to protect your TikTok account effectively.
-
The Ultimate Cyber Security Guide for TikTok Everyday Users, Influencers and Content Creators
- The First Ever Guide Dedicated to Protecting Your Presence and Privacy on TikTok
- Narrateur(s): AJ Collins
- Durée: 1 h et 35 min
- Date de publication: 2025-06-11
- Langue: Anglais
-
This audiobook is for you. It has been narrated specially for all TikTok Everyday Users, Influencers and Content Creators around the world. We’ll show you how you can make the most of TikTok – safely and securely!
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,62 $ ou gratuit avec l'essai de 30 jours
-
-
-
AI-Powered Fraud Prevention
- Securing Your Business in a Digital World
- Auteur(s): Deacon John O'Maley
- Narrateur(s): Michael P. Grande
- Durée: 1 h et 3 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This eBook will explore how AI-powered fraud prevention works, the types of fraud it can detect, and the benefits it brings. We’ll delve into real-life case studies, offer implementation tips, and look at future trends in AI-driven cybersecurity. The goal is to provide an informative yet accessible guide for small business owners, IT professionals, and executives on securing your business in a digital world through AI-powered fraud prevention.
-
AI-Powered Fraud Prevention
- Securing Your Business in a Digital World
- Narrateur(s): Michael P. Grande
- Série: The Deacon O’Maley AI Business Series
- Durée: 1 h et 3 min
- Date de publication: 2025-08-06
- Langue: Anglais
-
This eBook will explore how AI-powered fraud prevention works, the types of fraud it can detect, and the benefits it brings. We’ll delve into real-life case studies, offer implementation tips, and look at future trends in AI-driven cybersecurity.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,63 $ ou gratuit avec l'essai de 30 jours
-
-
-
CompTIA CASP+ Certification
- The Ultimate Study Guide to Master the Advanced Security Practitioner Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 17 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Unravel the intricate layers of modern cybersecurity with the comprehensive guide to the CompTIA CASP+ Certification Advanced Security Practitioner. Dive into the depths of this dynamic field as this book becomes your companion in mastering the multifaceted world of digital defense. This guide will equip both novice and seasoned professionals with the arsenal needed to fortify their expertise. Each chapter serves as a gateway into a domain crucial for fortifying networks, mitigating risks, and mastering advanced security practices.
-
CompTIA CASP+ Certification
- The Ultimate Study Guide to Master the Advanced Security Practitioner Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 17 min
- Date de publication: 2024-01-10
- Langue: Anglais
-
Unravel the intricate layers of modern cybersecurity with the comprehensive guide to the CompTIA CASP+ Certification Advanced Security Practitioner. Dive into the depths of this dynamic field as this book becomes your companion in mastering the multifaceted world of digital defense....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,06 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
CISA Strategic Plan 2023-2025
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 42 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
I am proud to share the 2023–2025 CISA Strategic Plan, the first comprehensive Strategic Plan since CISA was established as an agency in 2018. The strategic plan represents a forward-leaning, unified approach to achieving our vision of ensuring secure and resilient critical infrastructure for the American people.
-
CISA Strategic Plan 2023-2025
- Narrateur(s): Tom Brooks
- Durée: 2 h et 42 min
- Date de publication: 2023-09-25
- Langue: Anglais
-
I am proud to share the 2023–2025 CISA Strategic Plan, the first comprehensive Strategic Plan since CISA was established as an agency in 2018....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybercrime
- Top 10 Things You Need to Know About It
- Auteur(s): Sabian Gralden
- Narrateur(s): Chris Reynolds
- Durée: 2 h et 13 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This book is your guided tour through the digital underworld. In ten clear, accessible chapters, we explore the most common and dangerous forms of cybercrime. From phishing emails that trick the unwary into giving up passwords, to ransomware that can shut down entire hospitals or school systems, each chapter lifts the veil on a different threat. We explain how the attack works, who tends to be behind it, what kind of damage it causes, and how to protect yourself and your organization.
-
Cybercrime
- Top 10 Things You Need to Know About It
- Narrateur(s): Chris Reynolds
- Série: Con Men, Scams, Phishing and other Disgusting Practices and How to Get Ahead of Them, Livre 6
- Durée: 2 h et 13 min
- Date de publication: 2025-09-22
- Langue: Anglais
-
This book is a tour through the digital underworld. In ten chapters, we explore the most common and dangerous forms of cybercrime. From phishing emails that trick the unwary into giving up passwords to ransomware that can shut down entire systems, each chapter lifts the veil on a different threat.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
12,37 $ ou gratuit avec l'essai de 30 jours
-
-
-
Sekyurithitantoushanotamenojouhousekyurithitaisaku zissengaido2025nenbann
- Saizennsennnomamorinogennsoku Zyouhousekyurithitaisakuzissenngaido
- Auteur(s): Ito Kazuya
- Narrateur(s): Coefont Toyama Haru
- Durée: 2 h et 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
高度化するサイバー攻撃の現状に対応するためにセキュリティ担当者には基本の徹底と最先端の知識が不可欠です本書では課題から解決策まで実践的な視点で徹底解説します
-
Sekyurithitantoushanotamenojouhousekyurithitaisaku zissengaido2025nenbann
- Saizennsennnomamorinogennsoku Zyouhousekyurithitaisakuzissenngaido
- Narrateur(s): Coefont Toyama Haru
- Durée: 2 h et 53 min
- Date de publication: 2025-09-11
- Langue: Japonais
-
高度化するサイバー攻撃の現状に対応するためにセキュリティ担当者には基本の徹底と最先端の知識が不可欠です本書では課題から解決策まで実践的な視点で徹底解説します
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
11,37 $ ou gratuit avec l'essai de 30 jours
-
-
-
Public Wi-Fi Dangers
- 10 Tips for Safe Browsing
- Auteur(s): Alsden Keir
- Narrateur(s): Mark Tompkins
- Durée: 2 h
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Public Wi-Fi Dangers: 10 Tips for Safe Browsing is your essential guide to navigating the convenience—and the peril—of open wireless networks in today’s hyper-connected world. In this clear, practical, and eye-opening guide, cybersecurity author Alsden Keir strips away the illusion of safety surrounding public Wi-Fi and arms you with the knowledge to protect yourself. Each chapter focuses on a specific threat—and the corresponding action you can take to neutralize it.
-
Public Wi-Fi Dangers
- 10 Tips for Safe Browsing
- Narrateur(s): Mark Tompkins
- Durée: 2 h
- Date de publication: 2025-08-27
- Langue: Anglais
-
Public Wi-Fi Dangers: 10 Tips for Safe Browsing is your essential guide to navigating the convenience—and the peril—of open wireless networks in today’s hyper-connected world.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
12,37 $ ou gratuit avec l'essai de 30 jours
-
-
-
Liquid Computing
- The Future of Human-Tech Symbiosis
- Auteur(s): Paramendra Bhagat
- Narrateur(s): Ed Fairbanks's voice replica
- Durée: 3 h et 19 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Liquid Computing envisions a future beyond apps and interfaces—a world where artificial intelligence is ambient, adaptive, and seamlessly embedded in daily life. In this era, we don’t “use” computers; we live inside intelligent flows that span devices, contexts, and interactions. The book traces the evolution from hardware to cloud to AI as a responsive, invisible operating medium—always learning, assisting, and co-creating with us. It introduces the Liquid Interface, where interaction is natural, multimodal, and emotionally aware. Instead of commands, we converse.
-
Liquid Computing
- The Future of Human-Tech Symbiosis
- Narrateur(s): Ed Fairbanks's voice replica
- Durée: 3 h et 19 min
- Date de publication: 2025-06-27
- Langue: Anglais
-
Liquid Computing envisions a future beyond apps and interfaces—a world where artificial intelligence is ambient, adaptive, and seamlessly embedded in daily life. In this era, we don’t “use” computers; we live inside intelligent flows that span devices, contexts, and interactions.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,19 $ ou gratuit avec l'essai de 30 jours
-
-
-
Understanding Cryptography
- The Basic Science of Keeping Secrets Safe
- Auteur(s): Revin Laxtor
- Narrateur(s): Alejandro Cordoba
- Durée: 1 h et 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cryptography is the science of keeping information secret and secure. It’s one of the oldest and most fascinating fields in human history. Long before computers, satellites, and smartphones, people were using secret codes to share information that had to be kept away from prying eyes. From ancient Egyptian hieroglyphics to encrypted war plans during World War II, the desire to keep secrets safe has always been a part of human life. But cryptography isn’t just a subject for history books or spy movies. Today, cryptography is all around us.
-
Understanding Cryptography
- The Basic Science of Keeping Secrets Safe
- Narrateur(s): Alejandro Cordoba
- Durée: 1 h et 53 min
- Date de publication: 2025-07-14
- Langue: Anglais
-
Cryptography is the science of keeping information secret and secure. It’s one of the oldest and most fascinating fields in human history. Long before computers, satellites, and smartphones, people were using secret codes to share information that had to be kept away from prying eyes.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,62 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cloud Security Career Handbook
- A Beginner's Guide to Starting and Succeeding in Cloud Security
- Auteur(s): Timothy Isle
- Narrateur(s): Brent Caraway
- Durée: 2 h et 45 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cloud security is one of the hottest fields around, with the global cloud market expected to become a multi-billion-dollar industry by 2030. The demand for cloud security professionals is at an all-time high, and now is the best time to take that next step in your cybersecurity career!
-
Cloud Security Career Handbook
- A Beginner's Guide to Starting and Succeeding in Cloud Security
- Narrateur(s): Brent Caraway
- Durée: 2 h et 45 min
- Date de publication: 2023-06-14
- Langue: Anglais
-
Cloud security is one of the hottest fields around, with the global cloud market expected to become a multi-billion-dollar industry by 2030. The demand for cloud security professionals is at an all-time high, and now is the best time to take that next step in your cybersecurity career....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
13,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Censorship's Grave
- Observations, Tools, and Tips for Taking the Internet Back from Autocracies
- Auteur(s): Philip Collier
- Narrateur(s): Philip G Collier
- Durée: 4 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Censorship's Grave looks at modern methods of circumventing censorship and counteracting effects of information warfare. It argues that autocrats are losing the battle of censorship in an information age they no longer control. Unfortunately, the new information age contains a spectrum of arguments - from truth to blatant lies. The book was written by an author who has traveled extensively in countries with restricted media and used circumvention tools in all of them. It conveys a warning to not trade one disinfo system for another one.
-
Censorship's Grave
- Observations, Tools, and Tips for Taking the Internet Back from Autocracies
- Narrateur(s): Philip G Collier
- Durée: 4 h et 5 min
- Date de publication: 2023-05-11
- Langue: Anglais
-
Censorship's Grave looks at modern methods of circumventing censorship and counteracting effects of information warfare. It argues that autocrats are losing the battle of censorship in an information age they no longer control.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,15 $ ou gratuit avec l'essai de 30 jours
-
-
-
Exploding Data
- Reclaiming Our Cyber Security in the Digital Age
- Auteur(s): Michael Chertoff
- Narrateur(s): Jonathan Yen
- Durée: 6 h et 47 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy - the ability to make personal choices free of manipulation or coercion.
-
Exploding Data
- Reclaiming Our Cyber Security in the Digital Age
- Narrateur(s): Jonathan Yen
- Durée: 6 h et 47 min
- Date de publication: 2018-09-19
- Langue: Anglais
-
In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
19,81 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- Auteur(s): Kimberly Burk Cordova
- Narrateur(s): Hannah Stone
- Durée: 3 h et 15 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cybersecurity for Entrepreneurs is your essential guide to understanding and defending your business from the ever-evolving landscape of online threats. Written specifically for small business owners and entrepreneurs, this book simplifies complex cybersecurity concepts and equips you with practical strategies to safeguard your operations, data, and reputation.
-
Cybersecurity for Entrepreneurs: Safeguarding Your Business from Online Threats
- Empowering Small Businesses
- Narrateur(s): Hannah Stone
- Durée: 3 h et 15 min
- Date de publication: 2024-07-10
- Langue: Anglais
-
Cybersecurity for Entrepreneurs is your essential guide to understanding and defending your business from the ever-evolving landscape of online threats.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
World War ‘D’
- The Intersection of Cyber and Biological Pandemics
- Auteur(s): Christopher Rence
- Narrateur(s): Liam Alan
- Durée: 2 h et 22 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Life has never been easier thanks to the advancement of technology. However, with all new technological advancements also come new risks. The most drastically increasing issue in the world today is not biological warfare, but cyber warfare. Data has become the single most valuable commodity in today’s world, and, of course, there are always people lurking around the corner, trying to get their hands on it.
-
World War ‘D’
- The Intersection of Cyber and Biological Pandemics
- Narrateur(s): Liam Alan
- Durée: 2 h et 22 min
- Date de publication: 2024-06-04
- Langue: Anglais
-
Life has never been easier thanks to the advancement of technology. However, with all new technological advancements also come new risks. The most drastically increasing issue in the world today is not biological warfare, but cyber warfare.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
12,37 $ ou gratuit avec l'essai de 30 jours
-
-
-
Revolutionary Algorithms
- A TikTok Manifesto
- Auteur(s): Torey Akers
- Narrateur(s): Torey Akers
- Durée: 2 h et 1 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
From an artist and TikTok creator, a critical look at the controversial app and its effect on cultural heritage, artificial intelligence, community organizing, and digital censorship. In Revolutionary Algorithms, Torey Akers approaches TikTok with a deep understanding of the app, as both a...
-
Revolutionary Algorithms
- A TikTok Manifesto
- Narrateur(s): Torey Akers
- Durée: 2 h et 1 min
- Date de publication: 2025-01-07
- Langue: Anglais
- From an artist and TikTok creator, a critical look at the controversial app and its effect on cultural heritage, artificial intelligence, community organizing, and digital censorship. In Revolutionary Algorithms, Torey Akers approaches TikTok with a deep understanding of the app, as both a...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
19,10 $ ou gratuit avec l'essai de 30 jours
-
-
-
The CISA Tips On: Guide to Securing Remote Access Software
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Remote access software and tools comprise a broad array of capabilities used to maintain and improve IT, operational technology (OT), and industrial control systems (ICS) services; they allow a proactive and flexible approach for organizations to remotely oversee networks, computers, and other devices.
-
The CISA Tips On: Guide to Securing Remote Access Software
- Narrateur(s): Tom Brooks
- Durée: 1 h et 53 min
- Date de publication: 2023-06-22
- Langue: Anglais
-
Remote access software and tools comprise a broad array of capabilities used to maintain and improve IT, operational technology (OT), and industrial control systems (ICS) services....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,62 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Implement Artificial Intelligence and Cybersecurity in Modern Businesses
- Basics and Guides for Dummies and Beginners
- Auteur(s): Perry S.
- Narrateur(s): Ben Herold
- Durée: 1 h et 25 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This book is a good guide and provides basics on AI and cybersecurity to beginners and dummies. Also, it is helpful to answer questions of businesses like: How can one implement AI and cybersecurity in a company?, How and when can you link an AI?, and much more.
-
How to Implement Artificial Intelligence and Cybersecurity in Modern Businesses
- Basics and Guides for Dummies and Beginners
- Narrateur(s): Ben Herold
- Durée: 1 h et 25 min
- Date de publication: 2021-04-12
- Langue: Anglais
-
This book is a good guide and provides basics on AI and cybersecurity to beginners and dummies. Also, it is helpful to answer questions of businesses like: How can one implement AI and cybersecurity in a company?, How and when can you link an AI?, and much more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
9,77 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cybersecurity experts agree: No one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls.
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2022-01-14
- Langue: Anglais
-
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
12,37 $ ou gratuit avec l'essai de 30 jours
-