Security Engineering
-
-
Breached!
- Why Data Security Law Fails and How to Improve It: 1st Edition
- Auteur(s): Daniel J. Solove, Woodrow Hartzog
- Narrateur(s): Jim Frangione
- Durée: 7 h et 22 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Digital connections permeate our lives - and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself.
-
Breached!
- Why Data Security Law Fails and How to Improve It: 1st Edition
- Narrateur(s): Jim Frangione
- Durée: 7 h et 22 min
- Date de publication: 2022-03-15
- Langue: Anglais
-
In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Why Geography Matters
- More Than Ever
- Auteur(s): Harm de Blij
- Narrateur(s): John Pruden
- Durée: 14 h et 1 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In recent years our world has seen transformations of all kinds: intense climate change accompanied by significant weather extremes; deadly tsunamis caused by submarine earthquakes; unprecedented terrorist attacks; costly wars in Iraq and Afghanistan; a terrible and overlooked conflict in Equatorial Africa costing millions of lives; an economic crisis threatening the stability of the international system.
-
Why Geography Matters
- More Than Ever
- Narrateur(s): John Pruden
- Durée: 14 h et 1 min
- Date de publication: 2014-03-11
- Langue: Anglais
- In recent years our world has seen transformations of all kinds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
33,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Auteur(s): Lester Evans
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Version intégrale
-
Au global2
-
Performance1
-
Histoire1
If you want to avoid getting hacked, having your information spread, and discover the world of ethical hacking then pay attention.... Two manuscripts in one audiobook: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyber-Warfare, Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber-Security of Computer Networks, Including Tips on Social Engineering.
-
-
An interesting read, not a guide or study manual
- Écrit par Joel C LaRusic le 2019-08-06
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Date de publication: 2019-02-07
- Langue: Anglais
-
How hackers use raunchy photos to eke out private information; examples of preposterous social engineering attacks; how there's only one surefire way to protect against hacking; how to lower your exposure to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Networking
- An All-in-One Beginner's Guide to Understanding Communications Systems, Network Security, Internet Connections, Cybersecurity and Hacking
- Auteur(s): Quinn Kiser
- Narrateur(s): Ivan Busenius
- Durée: 3 h et 28 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area.
-
Computer Networking
- An All-in-One Beginner's Guide to Understanding Communications Systems, Network Security, Internet Connections, Cybersecurity and Hacking
- Narrateur(s): Ivan Busenius
- Durée: 3 h et 28 min
- Date de publication: 2020-08-07
- Langue: Anglais
-
This audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
経営層のためのサイバーセキュリティ実践入門~生成AI、DX、コネクティビティ時代を勝ち抜くための必須スキル~
- Auteur(s): 淵上 真一
- Narrateur(s): 橋本 英樹
- Durée: 6 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
ダボス会議でも重要議題となっているサイバー攻撃。自社がいつ攻撃されてもおかしくない時代に、経営者やマネジメント層が最低限知らなくてはならない基本知識を解説!今やサイバー攻撃(不正アクセス、マルウエア、ランサムウエア、サービス妨害など)は不特定多数の企業に対して行われるようになり、特別なものではなくなっています。
-
経営層のためのサイバーセキュリティ実践入門~生成AI、DX、コネクティビティ時代を勝ち抜くための必須スキル~
- Narrateur(s): 橋本 英樹
- Durée: 6 h et 4 min
- Date de publication: 2024-11-08
- Langue: Japonais
- ダボス会議でも重要議題となっているサイバー攻撃。自社がいつ攻撃されてもおかしくない時代に、経営者やマネジメント層が最低限知らなくてはならない基本知識を解説!今やサイバー攻撃(不正アクセス、マルウエア、ランサムウエア、サービス妨害など)は不特定多数の企業に対して行われるようになり、特別なものではなくなっています。
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,91 $ ou gratuit avec l'essai de 30 jours
-
-
-
Out of the Dark
- Paranormal Security and Intelligence Ops Shadow Agents: Part of the Immortal Ops World (Shadow Agents/PSI-Ops, Book 4)
- Auteur(s): Mandy M. Roth
- Narrateur(s): D. C. Cole
- Durée: 5 h et 19 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
Former Immortal Ops Agent Wheeler Summersbee has spent most of his life on the run from his own government. When he’d agreed to be a living test subject in their quest to genetically engineer the perfect super-soldiers, he never dreamed he’d come out the other side of the testing a gargoyle-vampire hybrid who craved blood and had a serious allergy to sunlight. So, when he finds himself trapped in what feels like eternal darkness, he abandons all hope. That is, until he hears the melodic voice of a mysterious woman. Could it be she’s his someone special?
-
Out of the Dark
- Paranormal Security and Intelligence Ops Shadow Agents: Part of the Immortal Ops World (Shadow Agents/PSI-Ops, Book 4)
- Narrateur(s): D. C. Cole
- Série: Shadow Agents Series, Livre 4
- Durée: 5 h et 19 min
- Date de publication: 2021-03-26
- Langue: Anglais
-
Former Immortal Ops Agent Wheeler Summersbee has spent most of his life on the run. When he’d agreed to be a living test subject in their quest to genetically engineer the perfect super-soldiers, he never dreamed he’d come out the other side of the testing a gargoyle-vampire....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: Become the Ultimate Hacker
- Computer Virus Cracking Malware IT Security
- Auteur(s): IT Starter Series, Joseph Connor
- Narrateur(s): Christopher C. Odom
- Durée: 4 h et 48 min
- Version intégrale
-
Au global2
-
Performance1
-
Histoire1
Although there are a few hackers out there who are considered to be dangerous, you don’t necessarily have to give up your passion for becoming one. This audiobook focuses more on ethical hacking that will allow you to contribute to an organization of your choice.
-
Hacking: Become the Ultimate Hacker
- Computer Virus Cracking Malware IT Security
- Narrateur(s): Christopher C. Odom
- Durée: 4 h et 48 min
- Date de publication: 2019-02-14
- Langue: Anglais
-
Although there are a few hackers out there who are considered to be dangerous, you don’t necessarily have to give up your passion for becoming one. This audiobook focuses more on ethical hacking that will allow you to contribute to an organization of your choice....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security Consultants Playbook
- The Key to Your Cyber Career
- Auteur(s): David Rauschendorfer
- Narrateur(s): Lauren Garvin
- Durée: 2 h et 24 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Cyber Security Consultants Playbook is your guide to streamlining your cybersecurity career by leveraging the tools and resources described in this audiobook. If you are building a career in cybersecurity or looking for new opportunities in this digital age, you need to get a copy of this audiobook.
-
Cyber Security Consultants Playbook
- The Key to Your Cyber Career
- Narrateur(s): Lauren Garvin
- Durée: 2 h et 24 min
- Date de publication: 2022-02-22
- Langue: Anglais
-
The Cyber Security Consultants Playbook is your guide to streamlining your cybersecurity career by leveraging the tools and resources described in this audiobook....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Green Real Deal
- American Energy, National Security, and a Better Plan for the Environment
- Auteur(s): Bill Herrington
- Narrateur(s): John Raynar
- Durée: 5 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Russian invasion of Ukraine is a wake-up call: The all-in stance in favor of renewables has rendered Europe's economy and national security vulnerable to Russian President Vladimir Putin. And America is in danger of making the same catastrophic energy mistake as Europe. Award-winning author Bill Herrington delivers the truth about U.S. energy, national security, and the environment—and exposes the misrepresentations of fossil fuels protestors and climate change activists.
-
The Green Real Deal
- American Energy, National Security, and a Better Plan for the Environment
- Narrateur(s): John Raynar
- Durée: 5 h et 4 min
- Date de publication: 2023-10-05
- Langue: Anglais
-
The Russian invasion of Ukraine is a wake-up call: The all-in stance in favor of renewables has rendered Europe's economy and national security vulnerable to Russian President Vladimir Putin. And America is in danger of making the same catastrophic energy mistake as Europe....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Storming the Wall
- Climate Change, Migration, and Homeland Security
- Auteur(s): Todd Miller
- Narrateur(s): Tim Pabon
- Durée: 6 h et 52 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As global warming accelerates, droughts last longer, floods rise higher, and super-storms become more frequent. With increasing numbers of people on the move as a result, the business of containing them - border fortification - is booming. In Storming the Wall, Todd Miller travels around the world to connect the dots between climate-ravaged communities, the corporations cashing in on border militarization, and emerging movements for environmental justice and sustainability.
-
Storming the Wall
- Climate Change, Migration, and Homeland Security
- Narrateur(s): Tim Pabon
- Durée: 6 h et 52 min
- Date de publication: 2020-12-24
- Langue: Anglais
-
As global warming accelerates, droughts last longer, floods rise higher, and super-storms become more frequent. With increasing numbers of people on the move as a result, the business of containing them - border fortification - is booming....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cybersecurity experts agree: No one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls.
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2022-01-14
- Langue: Anglais
-
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity
- What You Need to Know About Cybersecurity, Ethical Hacking, Risk Assessment, Social Engineering & How to Defend Yourself from Attacks
- Auteur(s): Ralph Voss
- Narrateur(s): James Powell
- Durée: 4 h et 12 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cyber Security may sound like something very complex. However, this book takes a simple, easy to understand approach to breakdown complex topics so that you can understand better and take appropriate action to protect your information once you finish listening.
-
Cybersecurity
- What You Need to Know About Cybersecurity, Ethical Hacking, Risk Assessment, Social Engineering & How to Defend Yourself from Attacks
- Narrateur(s): James Powell
- Durée: 4 h et 12 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
Cyber Security may sound like something very complex. However, this book takes a simple, easy to understand approach to breakdown complex topics so that you can understand better and take appropriate action to protect your information once you finish listening....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- Auteur(s): Abraham K White
- Narrateur(s): Dalan E Decker
- Durée: 5 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking.
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- Narrateur(s): Dalan E Decker
- Durée: 5 h et 49 min
- Date de publication: 2018-04-26
- Langue: Anglais
-
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- Auteur(s): Jonathan Rigdon
- Narrateur(s): Kevin Brooker
- Durée: 51 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- Narrateur(s): Kevin Brooker
- Durée: 51 min
- Date de publication: 2024-06-25
- Langue: Anglais
-
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
3,02 $ ou gratuit avec l'essai de 30 jours
-
-
-
Social Engineering
- Hiding in Plain Sight, InfoSec Series
- Auteur(s): Patricia Arnold
- Narrateur(s): Rich Grimshaw
- Durée: 1 h et 25 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Hiding in Plain Sight will explain my research about this increasing element that allows groups of individuals to steal and often be provided with privileged, personal information. Yet somehow, we are not adequately aware. If we were, I wouldn't hear of devastating financial losses from individuals that are not usually easily fooled. Many refer to much of this fraudulent activity as identity theft, but I believe that there is more going on here than what can be seen on the surface.
-
-
A reading of Social Engineering and Hacker terms.
- Écrit par Scott le 2017-12-05
-
Social Engineering
- Hiding in Plain Sight, InfoSec Series
- Narrateur(s): Rich Grimshaw
- Durée: 1 h et 25 min
- Date de publication: 2014-06-06
- Langue: Anglais
- Hiding in Plain Sight will explain my research about this increasing element that allows groups of individuals to steal and often be provided with privileged, personal information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Network Infrastructure Security Guidance
- National Security Agency Cybersecurity Technical Report
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 38 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Guidance for securing networks continues to evolve as new vulnerabilities are exploited by adversaries, new security features are implemented, and new methods of securing devices are identified. All networks are at risk of compromise, especially if devices are not properly configured and maintained. This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network.
-
Network Infrastructure Security Guidance
- National Security Agency Cybersecurity Technical Report
- Narrateur(s): Tom Brooks
- Durée: 3 h et 38 min
- Date de publication: 2022-03-21
- Langue: Anglais
-
All networks are at risk of compromise, especially if devices are not properly configured and maintained. This report presents best practices for overall network security and protection of individual network devices....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Gentle Introduction to Social Engineering Attack and Prevention
- Auteur(s): Stephen Haunts
- Narrateur(s): Timothy Burke
- Durée: 2 h et 42 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Social engineering is one of the biggest threats to our organizations today. Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems. In this audiobook, we will look at some of the techniques used in social engineering and look at how to guard yourself against them.
-
A Gentle Introduction to Social Engineering Attack and Prevention
- Narrateur(s): Timothy Burke
- Durée: 2 h et 42 min
- Date de publication: 2018-06-13
- Langue: Anglais
-
Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems. In this audiobook, we will look at some of the techniques used in social engineering and how to guard yourself against them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
IT Security Gumbo
- The Complete Vulnerability Lifecycle
- Auteur(s): Corey Charles
- Narrateur(s): Marie C.
- Durée: 1 h et 18 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
IT Security Gumbo: The Complete Vulnerability Lifecycle walks the listener through the entire vulnerability management life cycle and includes frameworks such as OWASP Top 10, .NET along with compliance and guidelines such as FIPS 199, HIPPA, NIST, FISMA and more. This book can not only serve as a guide for vulnerability management practitioners but it also can serve as a great reference for vendor certifications such as CISSP, CISA, CISM and Security+.
-
IT Security Gumbo
- The Complete Vulnerability Lifecycle
- Narrateur(s): Marie C.
- Durée: 1 h et 18 min
- Date de publication: 2020-09-11
- Langue: Anglais
-
IT Security Gumbo: The Complete Vulnerability Lifecycle walks the listener through the entire vulnerability management life cycle and includes frameworks such as OWASP Top 10, .NET along with compliance and guidelines such as FIPS 199, HIPPA, NIST, FISMA and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Auteur(s): David Rauschendorfer
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Every organization today faces an ever-changing set of threats in this digital landscape. Understanding how to develop a functional information security program to protect your organization’s reputation and brand from being tarnished due to a breach of your company’s sensitive information is more critical than ever. Developing a functional program that sets up the best information security practices across the organization’s operational workflows, is the leading practice for protecting against a possible breach.
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Date de publication: 2021-11-12
- Langue: Anglais
-
Every organization today faces an ever-changing set of threats in this digital landscape....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Auteur(s): Department of Justice FBI NSA Department of State
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Date de publication: 2023-06-21
- Langue: Anglais
-
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-