Security Engineering
-
-
Amazon Web Services in Action
- Auteur(s): Andreas Wittig, Michael Wittig
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability.
-
Amazon Web Services in Action
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Date de publication: 2018-12-12
- Langue: Anglais
-
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Blockchain and Web3
- Building the Cryptocurrency, Privacy, and Security Foundations of the Metaverse
- Auteur(s): Winston Ma, Ken Huang
- Narrateur(s): Christopher Grove
- Durée: 11 h et 53 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
To support a concept as bold as the Metaverse, we need several orders of magnitude more powerful computing capability, accessible at much lower latencies, across a multitude of devices and screens. You'll discover how blockchain can accelerate data flow, exchange, and transactions to create and transfer value around the world and, at the same time, how it can be used to protect user data privacy and security with decentralized web infrastructures.
-
Blockchain and Web3
- Building the Cryptocurrency, Privacy, and Security Foundations of the Metaverse
- Narrateur(s): Christopher Grove
- Durée: 11 h et 53 min
- Date de publication: 2022-10-11
- Langue: Anglais
-
In Blockchain and Web3, two tech and finance experts deliver a comprehensive and accessible guide to the present and future of blockchain technology and how it will form the foundation of a new, better internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Docker in Action
- Auteur(s): Jeff Nickoloff
- Narrateur(s): Aiden Humphreys
- Durée: 10 h et 12 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Docker in Action teaches listeners how to create, deploy, and manage applications hosted in Docker containers. After starting with a clear explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications. You will also learn how to run programs securely and how to manage shared resources. Using carefully designed examples, the book teaches you how to orchestrate containers and applications from installation to removal.
-
Docker in Action
- Narrateur(s): Aiden Humphreys
- Durée: 10 h et 12 min
- Date de publication: 2018-11-08
- Langue: Anglais
-
Docker in Action teaches listeners how to create, deploy, and manage applications hosted in Docker containers. After an explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Security Threats
- A Ring of Fire Novel (NESS Series, Book 3)
- Auteur(s): Bjorn Hasseler
- Narrateur(s): P.J. Ochlan
- Durée: 11 h et 16 min
- Version intégrale
-
Au global5 out of 5 stars 1
-
Performance5 out of 5 stars 1
-
Histoire5 out of 5 stars 1
Neustatter's European Security Services encounters a campaign of industrial sabotage, a pastor who attempts to limit their client base, an espionage ring, and the aftermath of the Dreeson assassination. Old nemeses and new allies complicate matters. Somewhere in Grantville is a missing heiress. There's also a Resistance, and it has cookies. Even repeat business with established clients is complicated, not to mention dangerous. Real life proves more complicated than Neustatter's movies or Astrid's books as NESS looks for common threads. Which incidents are related and which are not?
-
Security Threats
- A Ring of Fire Novel (NESS Series, Book 3)
- Narrateur(s): P.J. Ochlan
- Série: NESS Series, Livre 3
- Durée: 11 h et 16 min
- Date de publication: 2023-07-18
- Langue: Anglais
-
Neustatter's European Security Services encounters a campaign of industrial sabotage, a pastor who attempts to limit their client base, an espionage ring, and the aftermath of the Dreeson assassination. Old nemeses and new allies complicate matters....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking for Beginners
- A Step by Step Guide to Learn the Concept of Ethical Hacking. How to Use the Essential Command Line, Penetration Testing and Basic Security for Your First Hack.
- Auteur(s): Norman Laurence
- Narrateur(s): Cole Niblett
- Durée: 3 h et 54 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Do you find the art of computer hacking interesting to you? Do you want to become a hacker? Are you ready to get the real business of becoming an expert hacker? Well, you now have what you need to kick-start your journey of a stellar hacking career. This audiobook, Hacking for Beginners, guides you in an easy-to-understand, step-by-step procedure that’s ideal for a beginner who is intent on acquiring basic hacking skills. The audiobook is well-researched, neatly arranged, and ideally targeted at new learners.
-
Hacking for Beginners
- A Step by Step Guide to Learn the Concept of Ethical Hacking. How to Use the Essential Command Line, Penetration Testing and Basic Security for Your First Hack.
- Narrateur(s): Cole Niblett
- Durée: 3 h et 54 min
- Date de publication: 2020-09-29
- Langue: Anglais
-
Do you find the art of computer hacking interesting to you? Do you want to become a hacker? Are you ready to get the real business of becoming an expert hacker? Well, you now have what you need to kick-start your journey of a stellar hacking career....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Insecurity of Everything
- How Hardware Data Security Became the Biggest Issue Facing the World Today
- Auteur(s): Aaron Blum, Kevin Dillon, Brendan Egan, Autres
- Narrateur(s): James Osborn
- Durée: 6 h et 1 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Just 30 years ago, the average household only had a few electronics consisting of a television, landline phones, and appliances. Fast forward to today, and the average household has over four times this number, and it continues to grow by the day. This trend isn't just specific to households - it exists at companies, government entities, and virtually every organization and establishment around the world, including in developing countries. This has created a massive electronic waste issue, which is the largest growing stream of solid waste in the world.
-
The Insecurity of Everything
- How Hardware Data Security Became the Biggest Issue Facing the World Today
- Narrateur(s): James Osborn
- Durée: 6 h et 1 min
- Date de publication: 2021-10-07
- Langue: Anglais
-
Just 30 years ago, the average household only had a few electronics consisting of a television, landline phones, and appliances. Fast forward to today, and the average household has over four times this number, and it continues to grow by the day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Threat Multiplier
- Climate, Military Leadership, and the Fight for Global Security
- Auteur(s): Sherri Goodman
- Narrateur(s): Teri Schnaubelt
- Durée: 6 h et 31 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Threat Multiplier takes us onto the battlefield and inside the Pentagon to show how the US military is confronting the biggest security risk in global history: climate change. More than thirty years ago, Sherri Goodman became the Pentagon's first chief environmental officer. Indeed, for much of the twentieth century, the Department of Defense (DOD) was better known for containing the Soviet nuclear threat than protecting the environment.
-
Threat Multiplier
- Climate, Military Leadership, and the Fight for Global Security
- Narrateur(s): Teri Schnaubelt
- Durée: 6 h et 31 min
- Date de publication: 2025-03-11
- Langue: Anglais
-
Threat Multiplier takes us onto the battlefield and inside the Pentagon to show how the US military is confronting the biggest security risk in global history: climate change.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Identity and Access Management
- Recommended Best Practices for Administrators
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 4 min
- Version intégrale
-
Au global2 out of 5 stars 2
-
Performance3.5 out of 5 stars 2
-
Histoire2 out of 5 stars 2
Identity and access management (IAM) is a framework of business processes, policies, and technologies that facilitate the management of digital identities to ensure that users only gain access to data when they have the appropriate credentials.
-
2 out of 5 stars
-
This book in NOT for IAM professionals and will have little use for someone living outside of USA.
- Écrit par Utilisateur anonyme le 2024-10-04
-
Identity and Access Management
- Recommended Best Practices for Administrators
- Narrateur(s): Tom Brooks
- Durée: 3 h et 4 min
- Date de publication: 2023-04-04
- Langue: Anglais
-
Identity and access management (IAM) is a framework of business processes, policies, and technologies that facilitate the management of digital identities to ensure that users only gain access to data when they have the appropriate credentials....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Auteur(s): Lester Evans
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Version intégrale
-
Au global2 out of 5 stars 1
-
Performance3 out of 5 stars 1
-
Histoire1 out of 5 stars 1
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? You’re not alone. Half-baked products and services that chip away at your sense of ownership, independence and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers.
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Date de publication: 2019-02-05
- Langue: Anglais
-
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Out of the Dark
- Paranormal Security and Intelligence Ops Shadow Agents: Part of the Immortal Ops World (Shadow Agents/PSI-Ops, Book 4)
- Auteur(s): Mandy M. Roth
- Narrateur(s): D. C. Cole
- Durée: 5 h et 19 min
- Version intégrale
-
Au global5 out of 5 stars 2
-
Performance5 out of 5 stars 2
-
Histoire5 out of 5 stars 2
Former Immortal Ops Agent Wheeler Summersbee has spent most of his life on the run from his own government. When he’d agreed to be a living test subject in their quest to genetically engineer the perfect super-soldiers, he never dreamed he’d come out the other side of the testing a gargoyle-vampire hybrid who craved blood and had a serious allergy to sunlight. So, when he finds himself trapped in what feels like eternal darkness, he abandons all hope. That is, until he hears the melodic voice of a mysterious woman. Could it be she’s his someone special?
-
Out of the Dark
- Paranormal Security and Intelligence Ops Shadow Agents: Part of the Immortal Ops World (Shadow Agents/PSI-Ops, Book 4)
- Narrateur(s): D. C. Cole
- Série: Shadow Agents Series, Livre 4
- Durée: 5 h et 19 min
- Date de publication: 2021-03-26
- Langue: Anglais
-
Former Immortal Ops Agent Wheeler Summersbee has spent most of his life on the run. When he’d agreed to be a living test subject in their quest to genetically engineer the perfect super-soldiers, he never dreamed he’d come out the other side of the testing a gargoyle-vampire....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Breached!
- Why Data Security Law Fails and How to Improve It: 1st Edition
- Auteur(s): Daniel J. Solove, Woodrow Hartzog
- Narrateur(s): Jim Frangione
- Durée: 7 h et 22 min
- Version intégrale
-
Au global5 out of 5 stars 1
-
Performance5 out of 5 stars 1
-
Histoire5 out of 5 stars 1
Digital connections permeate our lives - and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself.
-
Breached!
- Why Data Security Law Fails and How to Improve It: 1st Edition
- Narrateur(s): Jim Frangione
- Durée: 7 h et 22 min
- Date de publication: 2022-03-15
- Langue: Anglais
-
In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Storming the Wall
- Climate Change, Migration, and Homeland Security
- Auteur(s): Todd Miller
- Narrateur(s): Tim Pabon
- Durée: 6 h et 52 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
As global warming accelerates, droughts last longer, floods rise higher, and super-storms become more frequent. With increasing numbers of people on the move as a result, the business of containing them - border fortification - is booming. In Storming the Wall, Todd Miller travels around the world to connect the dots between climate-ravaged communities, the corporations cashing in on border militarization, and emerging movements for environmental justice and sustainability.
-
Storming the Wall
- Climate Change, Migration, and Homeland Security
- Narrateur(s): Tim Pabon
- Durée: 6 h et 52 min
- Date de publication: 2020-12-24
- Langue: Anglais
-
As global warming accelerates, droughts last longer, floods rise higher, and super-storms become more frequent. With increasing numbers of people on the move as a result, the business of containing them - border fortification - is booming....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Level Up
- The Ultimate MSP Roadmap for Security, Operations and Profitability
- Auteur(s): Bruce McCully
- Narrateur(s): Trevor O'Hare
- Durée: 5 h et 32 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Protecting an MSP is hard work. But having an easy process to evaluate your security, be more effective, and grow your business all at the same time is indispensable to growing your MSP. Too many MSPs often focus on only a small piece of the problem (hiring a guru or shiny new tools) and miss out on the critical fundamentals keeping them and their clients vulnerable to major attacks and network breaches.
-
Level Up
- The Ultimate MSP Roadmap for Security, Operations and Profitability
- Narrateur(s): Trevor O'Hare
- Durée: 5 h et 32 min
- Date de publication: 2021-09-28
- Langue: Anglais
-
In Level Up, Bruce McCully takes a deep dive into what works and doesn’t work within MSP security. Having audited countless MSPs and MSP clients, Bruce has the first-hand experience to make your MSP more effective....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Cyber-Elephant in the Boardroom
- Cyber-Accountability with the Five Pillars of Security Framework
- Auteur(s): Mathieu Gorge
- Narrateur(s): Zack Sage
- Durée: 7 h et 6 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
We’ve all read the cybersecurity horror stories: a prominent company exposes the private information of their customers only to scramble after the fact to apologize and safeguard the data. Cybersecurity is often an afterthought, a much lower priority than profit—until a data breach threatens the bottom line anyway. In The Cyber-Elephant in the Boardroom, data security expert and CEO Mathieu Gorge, along with a host of guests, shows why protecting a company’s data should be top of mind for C-suites and corporate boards.
-
The Cyber-Elephant in the Boardroom
- Cyber-Accountability with the Five Pillars of Security Framework
- Narrateur(s): Zack Sage
- Durée: 7 h et 6 min
- Date de publication: 2023-04-24
- Langue: Anglais
-
In The Cyber-Elephant in the Boardroom, data security expert and CEO Mathieu Gorge, along with a host of guests, shows why protecting a company’s data should be top of mind for C-suites and corporate boards....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,21 $ ou gratuit avec l'essai de 30 jours
-
-
-
Eisenhower's Sputnik Moment
- The Race for Space and World Prestige
- Auteur(s): Yanek Mieczkowski
- Narrateur(s): Douglas R Pratt
- Durée: 13 h et 39 min
- Version intégrale
-
Au global4 out of 5 stars 1
-
Performance4 out of 5 stars 1
-
Histoire3 out of 5 stars 1
In Eisenhower's Sputnik Moment, Yanek Mieczkowski examines the early history of America's space program, reassessing Eisenhower's leadership. He details how Eisenhower approved breakthrough satellites, supported a new civilian space agency, signed a landmark science education law, and fostered improved relations with scientists. Offering a fast-paced account of this Cold War episode, Mieczkowski demonstrates that Eisenhower built an impressive record in space and on earth.
-
4 out of 5 stars
-
I like Ike, especially after this book
- Écrit par Matt le 2019-02-01
-
Eisenhower's Sputnik Moment
- The Race for Space and World Prestige
- Narrateur(s): Douglas R Pratt
- Durée: 13 h et 39 min
- Date de publication: 2018-07-18
- Langue: Anglais
-
Yanek Mieczkowski examines the early history of America's space program, reassessing Eisenhower's leadership. Offering a fast-paced account of this Cold War episode, Mieczkowski demonstrates that Eisenhower built an impressive record in space and on earth....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Why Geography Matters
- More Than Ever
- Auteur(s): Harm de Blij
- Narrateur(s): John Pruden
- Durée: 14 h et 1 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
In recent years our world has seen transformations of all kinds: intense climate change accompanied by significant weather extremes; deadly tsunamis caused by submarine earthquakes; unprecedented terrorist attacks; costly wars in Iraq and Afghanistan; a terrible and overlooked conflict in Equatorial Africa costing millions of lives; an economic crisis threatening the stability of the international system.
-
Why Geography Matters
- More Than Ever
- Narrateur(s): John Pruden
- Durée: 14 h et 1 min
- Date de publication: 2014-03-11
- Langue: Anglais
- In recent years our world has seen transformations of all kinds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
33,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Quantum Computing Cybersecurity Guide
- A Beginner’s Guide to Understanding and Addressing Quantum Security Risks and Threats
- Auteur(s): Taimur Ijlal
- Narrateur(s): Shawn Elliott
- Durée: 2 h et 7 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
Quantum computing is advancing fast—and when it arrives, today’s encryption may fail. This practical guide by cybersecurity expert Taimur Ijlal helps you understand and prepare for the quantum threat before it hits.
-
The Quantum Computing Cybersecurity Guide
- A Beginner’s Guide to Understanding and Addressing Quantum Security Risks and Threats
- Narrateur(s): Shawn Elliott
- Durée: 2 h et 7 min
- Date de publication: 2025-06-09
- Langue: Anglais
-
Quantum computing is advancing fast—and when it arrives, today’s encryption may fail. This practical guide by cybersecurity expert Taimur Ijlal helps you understand and prepare for the quantum threat before it hits.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: Basic Security, Penetration Testing, and How to Hack
- Auteur(s): Isaac Sharpe
- Narrateur(s): Martin James
- Durée: 2 h et 33 min
- Version intégrale
-
Au global0 out of 5 stars 0
-
Performance0 out of 5 stars 0
-
Histoire0 out of 5 stars 0
This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever you're hacking.
-
Hacking: Basic Security, Penetration Testing, and How to Hack
- Narrateur(s): Martin James
- Durée: 2 h et 33 min
- Date de publication: 2015-09-17
- Langue: Anglais
- This easy guide will help transform and increase your hacking skill set....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
We Rise
- The Earth Guardians Guide to Building a Movement That Restores the Planet
- Auteur(s): Xiuhtezcatl Martinez
- Narrateur(s): Drew Caiden
- Durée: 9 h et 11 min
- Version intégrale
-
Au global5 out of 5 stars 2
-
Performance5 out of 5 stars 2
-
Histoire5 out of 5 stars 2
Sixteen-year-old climate activist Xiuhtezcatl Martinez and his group the Earth Guardians believe that choices made now will have a lasting impact on the world of tomorrow, and they want to ensure a positive, just, and sustainable future. Beginning with their empowering story, We Rise explores many aspects of effective activism and provides step-by-step information on how to start and join solution-oriented movements.
-
We Rise
- The Earth Guardians Guide to Building a Movement That Restores the Planet
- Narrateur(s): Drew Caiden
- Durée: 9 h et 11 min
- Date de publication: 2017-09-05
- Langue: Anglais
- Sixteen-year-old climate activist Xiuhtezcatl Martinez and his group the Earth Guardians believe that choices made now will have a lasting impact on the world of tomorrow....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Auteur(s): Lester Evans
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Version intégrale
-
Au global2.5 out of 5 stars 2
-
Performance4 out of 5 stars 1
-
Histoire4 out of 5 stars 1
If you want to avoid getting hacked, having your information spread, and discover the world of ethical hacking then pay attention.... Two manuscripts in one audiobook: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyber-Warfare, Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber-Security of Computer Networks, Including Tips on Social Engineering.
-
3 out of 5 stars
-
An interesting read, not a guide or study manual
- Écrit par Joel C LaRusic le 2019-08-06
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Date de publication: 2019-02-07
- Langue: Anglais
-
How hackers use raunchy photos to eke out private information; examples of preposterous social engineering attacks; how there's only one surefire way to protect against hacking; how to lower your exposure to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-