Security Engineering
-
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- Auteur(s): Lester Evans
- Narrateur(s): Michael Reaves
- Durée: 3 h et 25 min
- Version intégrale
-
Au global12
-
Performance12
-
Histoire12
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention.... Do you create tons of accounts you will never again visit? Does your password contain a sequence of numbers, such as “123456”? Do you automatically click all links and download all email attachments coming from your friends? This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.
-
-
Absolutely Amazing for my first audiobook
- Écrit par Kelly H le 2021-10-28
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- Narrateur(s): Michael Reaves
- Durée: 3 h et 25 min
- Date de publication: 2019-01-10
- Langue: Anglais
-
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention.... Do you create tons of accounts you will never again visit? Does your password contain a sequence of numbers, such as “123456”? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Auteur(s): Kelly Shortridge, Aaron Rinehart - contributor
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
-
-
Great content but horribly annoying computer voice
- Écrit par Utilisateur anonyme le 2024-04-08
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Date de publication: 2023-11-28
- Langue: Anglais
-
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
33,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global30
-
Performance25
-
Histoire25
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Okay
- Écrit par AmazonShopper le 2024-03-04
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Date de publication: 2019-02-28
- Langue: Anglais
-
Renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix réduit: 6,99 $ (75% de réduction)
Prix courant: 27,83 $
Cette promotion se termine dansCette promotion est terminée -
-
-
Social Engineering
- The Art of Human Hacking
- Auteur(s): Paul Wilson - foreword, Christopher Hadnagy
- Narrateur(s): A. T. Chandler
- Durée: 14 h et 52 min
- Version intégrale
-
Au global6
-
Performance4
-
Histoire4
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
-
Social Engineering
- The Art of Human Hacking
- Narrateur(s): A. T. Chandler
- Durée: 14 h et 52 min
- Date de publication: 2020-07-10
- Langue: Anglais
-
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
National Security
- A Jericho Quinn Thriller, Book 1
- Auteur(s): Marc Cameron
- Narrateur(s): Tom Weiner
- Durée: 8 h et 56 min
- Version intégrale
-
Au global22
-
Performance21
-
Histoire21
Warning: The next terrorist attack on American soil is coming...sooner than you think. They can strike anytime, anywhere. A public landmark. A suburban shopping mall. And now, the human body itself. Three Middle Eastern terrorists have been injected with a biological weapon, human time bombs unleashed on American soil. They are prepared to die. To spread their disease. To annihilate millions. If America hopes to fight this enemy from within, we need a new kind of weapon. Meet Special Agent Jericho Quinn. Air Force veteran. Champion boxer. Trained assassin.
-
National Security
- A Jericho Quinn Thriller, Book 1
- Narrateur(s): Tom Weiner
- Série: Jericho Quinn, Livre 1
- Durée: 8 h et 56 min
- Date de publication: 2020-08-04
- Langue: Anglais
-
Warning: The next terrorist attack on American soil is coming...sooner than you think. They can strike anytime, anywhere. A public landmark. A suburban shopping mall. And now, the human body itself. Three Middle Eastern terrorists have been injected with a biological weapon....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Auteur(s): Lance Henderson
- Narrateur(s): James C. Lewis
- Durée: 12 h et 57 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Nothing about Kali Linux
- Écrit par Utilisateur anonyme le 2020-01-11
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Narrateur(s): James C. Lewis
- Durée: 12 h et 57 min
- Date de publication: 2018-06-07
- Langue: Anglais
-
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Networking
- The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
- Auteur(s): Michael B. White
- Narrateur(s): Jim D. Johnston
- Durée: 10 h et 6 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
Technology has gradually transitioned from wired to wireless over the years with tons of benefits. From the internet of things to wireless communication, we are all witnesses of the huge benefits of wireless technologies. This audiobook covers various subjects and highlights both the benefits and challenges of wireless technologies.
-
-
Lisp
- Écrit par Kevin le 2024-06-01
-
Computer Networking
- The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
- Narrateur(s): Jim D. Johnston
- Durée: 10 h et 6 min
- Date de publication: 2019-02-18
- Langue: Anglais
-
Technology has gradually transitioned from wired to wireless over the years with tons of benefits. This audiobook covers various subjects and highlights both the benefits and challenges of wireless technologies....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Quantum Computing Cybersecurity Guide
- A Beginner’s Guide to Understanding and Addressing Quantum Security Risks and Threats
- Auteur(s): Taimur Ijlal
- Narrateur(s): Shawn Elliott
- Durée: 2 h et 7 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Quantum computing is advancing fast—and when it arrives, today’s encryption may fail. This practical guide by cybersecurity expert Taimur Ijlal helps you understand and prepare for the quantum threat before it hits.
-
The Quantum Computing Cybersecurity Guide
- A Beginner’s Guide to Understanding and Addressing Quantum Security Risks and Threats
- Narrateur(s): Shawn Elliott
- Durée: 2 h et 7 min
- Date de publication: 2025-06-09
- Langue: Anglais
-
Quantum computing is advancing fast—and when it arrives, today’s encryption may fail. This practical guide by cybersecurity expert Taimur Ijlal helps you understand and prepare for the quantum threat before it hits.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Blockchain and Web3
- Building the Cryptocurrency, Privacy, and Security Foundations of the Metaverse
- Auteur(s): Winston Ma, Ken Huang
- Narrateur(s): Christopher Grove
- Durée: 11 h et 53 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
To support a concept as bold as the Metaverse, we need several orders of magnitude more powerful computing capability, accessible at much lower latencies, across a multitude of devices and screens. You'll discover how blockchain can accelerate data flow, exchange, and transactions to create and transfer value around the world and, at the same time, how it can be used to protect user data privacy and security with decentralized web infrastructures.
-
Blockchain and Web3
- Building the Cryptocurrency, Privacy, and Security Foundations of the Metaverse
- Narrateur(s): Christopher Grove
- Durée: 11 h et 53 min
- Date de publication: 2022-10-11
- Langue: Anglais
-
In Blockchain and Web3, two tech and finance experts deliver a comprehensive and accessible guide to the present and future of blockchain technology and how it will form the foundation of a new, better internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Amazon Web Services in Action
- Auteur(s): Andreas Wittig, Michael Wittig
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability.
-
Amazon Web Services in Action
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Date de publication: 2018-12-12
- Langue: Anglais
-
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Auteur(s): Norman Laurence
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Date de publication: 2020-10-21
- Langue: Anglais
-
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Security Threats
- A Ring of Fire Novel (NESS Series, Book 3)
- Auteur(s): Bjorn Hasseler
- Narrateur(s): P.J. Ochlan
- Durée: 11 h et 16 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Neustatter's European Security Services encounters a campaign of industrial sabotage, a pastor who attempts to limit their client base, an espionage ring, and the aftermath of the Dreeson assassination. Old nemeses and new allies complicate matters. Somewhere in Grantville is a missing heiress. There's also a Resistance, and it has cookies. Even repeat business with established clients is complicated, not to mention dangerous. Real life proves more complicated than Neustatter's movies or Astrid's books as NESS looks for common threads. Which incidents are related and which are not?
-
Security Threats
- A Ring of Fire Novel (NESS Series, Book 3)
- Narrateur(s): P.J. Ochlan
- Série: NESS Series, Livre 3
- Durée: 11 h et 16 min
- Date de publication: 2023-07-18
- Langue: Anglais
-
Neustatter's European Security Services encounters a campaign of industrial sabotage, a pastor who attempts to limit their client base, an espionage ring, and the aftermath of the Dreeson assassination. Old nemeses and new allies complicate matters....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
21,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
Identity and Access Management
- Recommended Best Practices for Administrators
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 4 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
Identity and access management (IAM) is a framework of business processes, policies, and technologies that facilitate the management of digital identities to ensure that users only gain access to data when they have the appropriate credentials.
-
-
This book in NOT for IAM professionals and will have little use for someone living outside of USA.
- Écrit par Utilisateur anonyme le 2024-10-04
-
Identity and Access Management
- Recommended Best Practices for Administrators
- Narrateur(s): Tom Brooks
- Durée: 3 h et 4 min
- Date de publication: 2023-04-04
- Langue: Anglais
-
Identity and access management (IAM) is a framework of business processes, policies, and technologies that facilitate the management of digital identities to ensure that users only gain access to data when they have the appropriate credentials....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Storming the Wall
- Climate Change, Migration, and Homeland Security
- Auteur(s): Todd Miller
- Narrateur(s): Tim Pabon
- Durée: 6 h et 52 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
As global warming accelerates, droughts last longer, floods rise higher, and super-storms become more frequent. With increasing numbers of people on the move as a result, the business of containing them - border fortification - is booming. In Storming the Wall, Todd Miller travels around the world to connect the dots between climate-ravaged communities, the corporations cashing in on border militarization, and emerging movements for environmental justice and sustainability.
-
Storming the Wall
- Climate Change, Migration, and Homeland Security
- Narrateur(s): Tim Pabon
- Durée: 6 h et 52 min
- Date de publication: 2020-12-24
- Langue: Anglais
-
As global warming accelerates, droughts last longer, floods rise higher, and super-storms become more frequent. With increasing numbers of people on the move as a result, the business of containing them - border fortification - is booming....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Circuit Engineering + Cryptography + CompTIA A+
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 23 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Is circuit engineering what you want to learn? Always wondered how one becomes an electrical engineer? Do semiconductors and circuit boards interest you? Download Circuit Engineering + Cryptography + CompTIA A+ to discover everything you need to know about basic electronics. You'll learn step by step how to increase your electrical skills, the anatomy of a circuit, and all your basic knowledge in one download!
-
Circuit Engineering + Cryptography + CompTIA A+
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 23 min
- Date de publication: 2016-03-02
- Langue: Anglais
- You'll learn step by step how to increase your electrical skills, the anatomy of a circuit, and all your basic knowledge in one download....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Threat Multiplier
- Climate, Military Leadership, and the Fight for Global Security
- Auteur(s): Sherri Goodman
- Narrateur(s): Teri Schnaubelt
- Durée: 6 h et 31 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Threat Multiplier takes us onto the battlefield and inside the Pentagon to show how the US military is confronting the biggest security risk in global history: climate change. More than thirty years ago, Sherri Goodman became the Pentagon's first chief environmental officer. Indeed, for much of the twentieth century, the Department of Defense (DOD) was better known for containing the Soviet nuclear threat than protecting the environment.
-
Threat Multiplier
- Climate, Military Leadership, and the Fight for Global Security
- Narrateur(s): Teri Schnaubelt
- Durée: 6 h et 31 min
- Date de publication: 2025-03-11
- Langue: Anglais
-
Threat Multiplier takes us onto the battlefield and inside the Pentagon to show how the US military is confronting the biggest security risk in global history: climate change.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Incident & Vulnerability Response Playbooks
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 23 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Cybersecurity and Infrastructure Security Agency (CISA) is committed to leading the response to cybersecurity incidents and vulnerabilities to safeguard the nation's critical assets. Section 6 of Executive Order 14028 directed DHS, via CISA, to “develop a standard set of operational procedures (playbook) to be used in planning and conducting cybersecurity vulnerability and incident response activity respecting Federal Civilian Executive Branch (FCEB) Information Systems.
-
Cybersecurity Incident & Vulnerability Response Playbooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 23 min
- Date de publication: 2021-12-01
- Langue: Anglais
-
These playbooks provide FCEB agencies with a standard set of procedures to identify, coordinate, remediate, recover, and track successful mitigations from incidents and vulnerabilities affecting FCEB systems, data, and networks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Auteur(s): Hans Weber
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how can you safeguard yourself from the different threats? Let’s find out. We will also take a look at the career of a computer networking specialist and the challenges you can expect.
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Date de publication: 2020-06-12
- Langue: Anglais
-
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how to safeguard yourself from the different threats? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Start a Security Guard Company
- Creative Strategies for Getting Your Private Security Agency Up and Running
- Auteur(s): J W Murphey
- Narrateur(s): J W Murphey
- Durée: 3 h et 6 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
At the age of just 19, JW Murphey didn't have access to large amounts of private security industry experience, a bunch of cash, an audiobook, or the Internet to help him start his security guard company. But, he didn't want to spend years as another cog inside of a large security corporation. Instead of staying employed with a big corporation, he struck out on his own and started his own security agency. How to Start a Security Guard Company book includes Murphey's creative strategies for building a private security agency with a minimal up-front investment.
-
How to Start a Security Guard Company
- Creative Strategies for Getting Your Private Security Agency Up and Running
- Narrateur(s): J W Murphey
- Durée: 3 h et 6 min
- Date de publication: 2018-01-19
- Langue: Anglais
-
Here you'll find Murphey's creative strategies for building a private security agency with a minimal up-front investment....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Auteur(s): Lester Evans
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? You’re not alone. Half-baked products and services that chip away at your sense of ownership, independence and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers.
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Date de publication: 2019-02-05
- Langue: Anglais
-
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-