Security Engineering
-
-
Future War
- Preparing for the New Global Battlefield
- Auteur(s): Robert H. Latiff
- Narrateur(s): Johnathan McClain
- Durée: 4 h et 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
An urgent, prescient, and expert look at how future technology will change virtually every aspect of war as we know it and how we can respond to the serious national security challenges ahead. Future war is almost here: battles fought in cyberspace; biologically enhanced soldiers; autonomous...
-
Future War
- Preparing for the New Global Battlefield
- Narrateur(s): Johnathan McClain
- Durée: 4 h et 53 min
- Date de publication: 2017-09-26
- Langue: Anglais
- Espionnage · Liberté et sécurité · Guerre
- An urgent, prescient, and expert look at how future technology will change virtually every aspect of war as we know it and how we can respond to the serious national security challenges ahead. Future war is almost here: battles fought in cyberspace; biologically enhanced soldiers; autonomous...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,48 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Incident & Vulnerability Response Playbooks
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 23 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Cybersecurity and Infrastructure Security Agency (CISA) is committed to leading the response to cybersecurity incidents and vulnerabilities to safeguard the nation's critical assets. Section 6 of Executive Order 14028 directed DHS, via CISA, to “develop a standard set of operational procedures (playbook) to be used in planning and conducting cybersecurity vulnerability and incident response activity respecting Federal Civilian Executive Branch (FCEB) Information Systems.
-
Cybersecurity Incident & Vulnerability Response Playbooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 23 min
- Date de publication: 2021-12-01
- Langue: Anglais
- Cybersécurité · Ingénierie
-
These playbooks provide FCEB agencies with a standard set of procedures to identify, coordinate, remediate, recover, and track successful mitigations from incidents and vulnerabilities affecting FCEB systems, data, and networks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Blockchain and Web3
- Building the Cryptocurrency, Privacy, and Security Foundations of the Metaverse
- Auteur(s): Winston Ma, Ken Huang
- Narrateur(s): Christopher Grove
- Durée: 11 h et 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
To support a concept as bold as the Metaverse, we need several orders of magnitude more powerful computing capability, accessible at much lower latencies, across a multitude of devices and screens. You'll discover how blockchain can accelerate data flow, exchange, and transactions to create and transfer value around the world and, at the same time, how it can be used to protect user data privacy and security with decentralized web infrastructures.
-
Blockchain and Web3
- Building the Cryptocurrency, Privacy, and Security Foundations of the Metaverse
- Narrateur(s): Christopher Grove
- Durée: 11 h et 53 min
- Date de publication: 2022-10-11
- Langue: Anglais
- Cryptomonnaie · Gestion et leadership
-
In Blockchain and Web3, two tech and finance experts deliver a comprehensive and accessible guide to the present and future of blockchain technology and how it will form the foundation of a new, better internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- Auteur(s): Roger A. Grimes
- Narrateur(s): Ray Greenley
- Durée: 11 h et 43 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.
-
-
I dash think dash you dash need dash links dash in download able dash pdf
- Écrit par Fedaykin Wolf le 2024-05-14
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- Narrateur(s): Ray Greenley
- Durée: 11 h et 43 min
- Date de publication: 2024-03-26
- Langue: Anglais
-
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Quantum Computing Cybersecurity Guide
- A Beginner’s Guide to Understanding and Addressing Quantum Security Risks and Threats
- Auteur(s): Taimur Ijlal
- Narrateur(s): Shawn Elliott
- Durée: 2 h et 7 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Quantum computing is advancing fast—and when it arrives, today’s encryption may fail. This practical guide by cybersecurity expert Taimur Ijlal helps you understand and prepare for the quantum threat before it hits.
-
The Quantum Computing Cybersecurity Guide
- A Beginner’s Guide to Understanding and Addressing Quantum Security Risks and Threats
- Narrateur(s): Shawn Elliott
- Durée: 2 h et 7 min
- Date de publication: 2025-06-09
- Langue: Anglais
- Cybersécurité · Physique · Science
-
Quantum computing is advancing fast—and when it arrives, today’s encryption may fail. This practical guide by cybersecurity expert Taimur Ijlal helps you understand and prepare for the quantum threat before it hits.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Titan II
- A History of a Cold War Missile
- Auteur(s): David Stumpf
- Narrateur(s): Douglas R. Pratt
- Durée: 12 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
A comprehensive study of the missile system that formed a critical component of the United States' nuclear arsenal. The Titan II ICBM (intercontinental ballistic missile) program was developed by the United States military to bolster the size, strength, and speed of the nation's strategic weapons arsenal in the 1950s and 1960s.
-
Titan II
- A History of a Cold War Missile
- Narrateur(s): Douglas R. Pratt
- Durée: 12 h et 6 min
- Date de publication: 2014-09-05
- Langue: Anglais
- Amériques · Armes et guerre
- A comprehensive study of the missile system that formed a critical component of the United States' nuclear arsenal....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Auteur(s): Hans Weber
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how can you safeguard yourself from the different threats? Let’s find out. We will also take a look at the career of a computer networking specialist and the challenges you can expect.
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Date de publication: 2020-06-12
- Langue: Anglais
- Ingénierie
-
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how to safeguard yourself from the different threats? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Warnings
- Finding Cassandras to Stop Catastrophes
- Auteur(s): Richard A. Clarke, R.P. Eddy
- Narrateur(s): L.J. Ganser
- Durée: 12 h et 45 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Warnings is the story of the future of national security, threatening technologies, the US economy, and possibly the fate of civilization. In Greek mythology Cassandra foresaw calamities, but was cursed by the gods to be ignored. Modern-day Cassandras clearly predicted the disasters of Katrina, Fukushima, the Great Recession, the rise of ISIS, and many more. Like the mythological Cassandra, they were ignored. There are others right now warning of impending disasters, but how do we know which warnings are likely to be right?
-
Warnings
- Finding Cassandras to Stop Catastrophes
- Narrateur(s): L.J. Ganser
- Durée: 12 h et 45 min
- Date de publication: 2017-11-07
- Langue: Anglais
- Espionnage · Environnement · Carrière
- Warnings is the story of the future of national security, threatening technologies, the US economy, and possibly the fate of civilization....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
40,44 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Start a Security Guard Company
- Creative Strategies for Getting Your Private Security Agency Up and Running
- Auteur(s): J W Murphey
- Narrateur(s): J W Murphey
- Durée: 3 h et 6 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
At the age of just 19, JW Murphey didn't have access to large amounts of private security industry experience, a bunch of cash, an audiobook, or the Internet to help him start his security guard company. But, he didn't want to spend years as another cog inside of a large security corporation. Instead of staying employed with a big corporation, he struck out on his own and started his own security agency. How to Start a Security Guard Company book includes Murphey's creative strategies for building a private security agency with a minimal up-front investment.
-
How to Start a Security Guard Company
- Creative Strategies for Getting Your Private Security Agency Up and Running
- Narrateur(s): J W Murphey
- Durée: 3 h et 6 min
- Date de publication: 2018-01-19
- Langue: Anglais
- Gestion et leadership · Éducation
-
Here you'll find Murphey's creative strategies for building a private security agency with a minimal up-front investment....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Auteur(s): Lester Evans
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? You’re not alone. Half-baked products and services that chip away at your sense of ownership, independence and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers.
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Date de publication: 2019-02-05
- Langue: Anglais
- Histoire et culture · Informatique
-
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Dark Skies
- Space Expansionism, Planetary Geopolitics, and the Ends of Humanity
- Auteur(s): Daniel Deudney
- Narrateur(s): Tom Parks
- Durée: 20 h et 40 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In the first book to critically assess the major consequences of space activities from their origins in the 1940s to the present and beyond, Daniel Deudney argues in Dark Skies that the major result of the "Space Age" has been to increase the likelihood of global nuclear war, a fact conveniently obscured by the failure of recognize that nuclear-armed ballistic missiles are inherently space weapons.
-
Dark Skies
- Space Expansionism, Planetary Geopolitics, and the Ends of Humanity
- Narrateur(s): Tom Parks
- Durée: 20 h et 40 min
- Date de publication: 2020-12-29
- Langue: Anglais
- Espionnage · Affaires mondiales
-
Daniel Deudney argues in Dark Skies that the major result of the "Space Age" has been to increase the likelihood of global nuclear war, a fact conveniently obscured by the failure of recognize that nuclear-armed ballistic missiles are inherently space weapons....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
33,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
Breached!
- Why Data Security Law Fails and How to Improve It: 1st Edition
- Auteur(s): Daniel J. Solove, Woodrow Hartzog
- Narrateur(s): Jim Frangione
- Durée: 7 h et 22 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Digital connections permeate our lives - and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself.
-
Breached!
- Why Data Security Law Fails and How to Improve It: 1st Edition
- Narrateur(s): Jim Frangione
- Durée: 7 h et 22 min
- Date de publication: 2022-03-15
- Langue: Anglais
- Droit · Ingénierie
-
In Breached!, Daniel Solove and Woodrow Hartzog, two of the world’s leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Amazon Web Services in Action
- Auteur(s): Andreas Wittig, Michael Wittig
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability.
-
Amazon Web Services in Action
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Date de publication: 2018-12-12
- Langue: Anglais
- Histoire et culture · Science des données
-
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Insecurity of Everything
- How Hardware Data Security Became the Biggest Issue Facing the World Today
- Auteur(s): Aaron Blum, Kevin Dillon, Brendan Egan, Autres
- Narrateur(s): James Osborn
- Durée: 6 h et 1 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Just 30 years ago, the average household only had a few electronics consisting of a television, landline phones, and appliances. Fast forward to today, and the average household has over four times this number, and it continues to grow by the day. This trend isn't just specific to households - it exists at companies, government entities, and virtually every organization and establishment around the world, including in developing countries. This has created a massive electronic waste issue, which is the largest growing stream of solid waste in the world.
-
The Insecurity of Everything
- How Hardware Data Security Became the Biggest Issue Facing the World Today
- Narrateur(s): James Osborn
- Durée: 6 h et 1 min
- Date de publication: 2021-10-07
- Langue: Anglais
- Ingénierie
-
Just 30 years ago, the average household only had a few electronics consisting of a television, landline phones, and appliances. Fast forward to today, and the average household has over four times this number, and it continues to grow by the day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Auteur(s): Lester Evans
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Version intégrale
-
Au global2
-
Performance1
-
Histoire1
If you want to avoid getting hacked, having your information spread, and discover the world of ethical hacking then pay attention.... Two manuscripts in one audiobook: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyber-Warfare, Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber-Security of Computer Networks, Including Tips on Social Engineering.
-
-
An interesting read, not a guide or study manual
- Écrit par Joel C LaRusic le 2019-08-06
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Date de publication: 2019-02-07
- Langue: Anglais
- Histoire et culture
-
How hackers use raunchy photos to eke out private information; examples of preposterous social engineering attacks; how there's only one surefire way to protect against hacking; how to lower your exposure to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Common Sense for the 21st Century
- Only Nonviolent Rebellion Can Now Stop Climate Breakdown and Social Collapse
- Auteur(s): Roger Hallam
- Narrateur(s): Tim Bruce
- Durée: 2 h et 53 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
An urgent, essential, and practical call to action from the co-founder of Extinction Rebellion. The climate crisis threatens global social collapse. Within a generation. What to do? Common Sense for the 21st Century outlines how movements around the world now need to come together to start doing "what works". This means engaging in mass civil disobedience to make real change happen. This booklet is not just theory, it is the call to action. The political class is not going to save us from extinction.
-
Common Sense for the 21st Century
- Only Nonviolent Rebellion Can Now Stop Climate Breakdown and Social Collapse
- Narrateur(s): Tim Bruce
- Durée: 2 h et 53 min
- Date de publication: 2019-11-27
- Langue: Anglais
- Environnement · Guerres et conflits
-
An urgent, essential, and practical call to action from the co-founder of Extinction Rebellion. The climate crisis threatens global social collapse. Within a generation. What to do? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,10 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cultivated Meat to Secure Our Future
- Hope for Animals, Food Security, and the Environment
- Auteur(s): Michel Vandenbosch, Philip Lymbery
- Narrateur(s): Thomas Martin
- Durée: 5 h et 27 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This provocative book informs, inspires, and opens debates about cultivated meat through an amazing collection of visionary and respected contributors. Each essay in this collection powerfully presents the latest research and opinions regarding its potential for solving our current planetary crises.
-
Cultivated Meat to Secure Our Future
- Hope for Animals, Food Security, and the Environment
- Narrateur(s): Thomas Martin
- Durée: 5 h et 27 min
- Date de publication: 2025-10-23
- Langue: Anglais
- Environnement · Nature et écologie · Science
-
This provocative book informs, inspires, and opens debates about cultivated meat through an amazing collection of visionary and respected contributors. Each essay in this collection powerfully presents the latest research and opinions regarding its potential for solving our current planetary crises.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Networking
- An All-in-One Beginner's Guide to Understanding Communications Systems, Network Security, Internet Connections, Cybersecurity and Hacking
- Auteur(s): Quinn Kiser
- Narrateur(s): Ivan Busenius
- Durée: 3 h et 28 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
This audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area.
-
Computer Networking
- An All-in-One Beginner's Guide to Understanding Communications Systems, Network Security, Internet Connections, Cybersecurity and Hacking
- Narrateur(s): Ivan Busenius
- Durée: 3 h et 28 min
- Date de publication: 2020-08-07
- Langue: Anglais
- Ingénierie
-
This audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Full Planet
- Empty Plates
- Auteur(s): Lester R. Brown
- Narrateur(s): Alpha Trivette
- Durée: 4 h et 17 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
With food scarcity driven by falling water tables, eroding soils, and rising temperatures, control of arable land and water resources is moving to center stage in the global struggle for food security. “In this era of tightening world food supplies, the ability to grow food is fast becoming a new form of geopolitical leverage. Food is the new oil,” Lester R. Brown writes. What will the geopolitics of food look like in a new era dominated by scarcity and food nationalism?
-
Full Planet
- Empty Plates
- Narrateur(s): Alpha Trivette
- Durée: 4 h et 17 min
- Date de publication: 2013-04-19
- Langue: Anglais
- Environnement · Liberté et sécurité · Politique
- With food supplies tightening, countries are competing for the land and water resources needed to feed their people....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
19,78 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Cyber-Elephant in the Boardroom
- Cyber-Accountability with the Five Pillars of Security Framework
- Auteur(s): Mathieu Gorge
- Narrateur(s): Zack Sage
- Durée: 7 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
We’ve all read the cybersecurity horror stories: a prominent company exposes the private information of their customers only to scramble after the fact to apologize and safeguard the data. Cybersecurity is often an afterthought, a much lower priority than profit—until a data breach threatens the bottom line anyway. In The Cyber-Elephant in the Boardroom, data security expert and CEO Mathieu Gorge, along with a host of guests, shows why protecting a company’s data should be top of mind for C-suites and corporate boards.
-
The Cyber-Elephant in the Boardroom
- Cyber-Accountability with the Five Pillars of Security Framework
- Narrateur(s): Zack Sage
- Durée: 7 h et 6 min
- Date de publication: 2023-04-24
- Langue: Anglais
- Ingénierie
-
In The Cyber-Elephant in the Boardroom, data security expert and CEO Mathieu Gorge, along with a host of guests, shows why protecting a company’s data should be top of mind for C-suites and corporate boards....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,21 $ ou gratuit avec l'essai de 30 jours
-