Information Security
-
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Auteur(s): Mike Chapple, James Michael Stewart, Darril Gibson
- Narrateur(s): Tom Parks
- Durée: 65 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Narrateur(s): Tom Parks
- Durée: 65 h et 38 min
- Date de publication: 2023-02-28
- Langue: Anglais
-
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
44,54 $ ou gratuit avec l'essai de 30 jours
-
-
-
Certified Information Security Manager CISM Study Guide
- Auteur(s): Mike Chapple PhD CISM
- Narrateur(s): Daniel Henning
- Durée: 19 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job. Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further.
-
Certified Information Security Manager CISM Study Guide
- Narrateur(s): Daniel Henning
- Durée: 19 h et 21 min
- Date de publication: 2023-02-21
- Langue: Anglais
-
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
33,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Kubark Counterintelligence Interrogation Manual
- Auteur(s): Central Intelligence Agency
- Narrateur(s): John Riddle
- Durée: 4 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Released by the Freedom of Information Act. This document is a thorough description of how the CIA recommends interrogating a subject. To get the information that is needed there is nothing withheld short of torture. For example in "Threats and Fears," the CIA authors note that "the threat of coercion usually weakens or destroys resistance more effectively than coercion itself. The threat to inflict pain, for example, can trigger fears more damaging than the immediate sensation of pain."
-
The Kubark Counterintelligence Interrogation Manual
- Narrateur(s): John Riddle
- Durée: 4 h et 13 min
- Date de publication: 2023-07-12
- Langue: Anglais
-
Released by the Freedom of Information Act. This document is a thorough description of how the CIA recommends interrogating a subject. To get the information that is needed there is nothing withheld short of torture....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
10,09 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Information
- A History, a Theory, a Flood
- Auteur(s): James Gleick
- Narrateur(s): Rob Shapiro
- Durée: 16 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
James Gleick, the author of the best sellers Chaos and Genius, now brings us a work just as astonishing and masterly: A revelatory chronicle and meditation that shows how information has become the modern era’s defining quality - the blood, the fuel, the vital principle of our world. The story of information begins in a time profoundly unlike our own, when every thought and utterance vanishes as soon as it is born.
-
-
So, hear me out...
- Écrit par Quenton le 2019-09-26
-
The Information
- A History, a Theory, a Flood
- Narrateur(s): Rob Shapiro
- Durée: 16 h et 37 min
- Date de publication: 2011-03-01
- Langue: Anglais
-
James Gleick, the author of the best sellers Chaos and Genius, now brings us a work just as astonishing and masterly: A revelatory chronicle and meditation that shows how information has become the modern era’s defining quality....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
29,14 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Vulnerable System
- The History of Information Security in the Computer Age
- Auteur(s): Andrew J. Stewart
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
A Vulnerable System
- The History of Information Security in the Computer Age
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Date de publication: 2021-09-14
- Langue: Anglais
-
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Transforming Information Security
- Optimizing Five Concurrent Trends to Reduce Resource Drain
- Auteur(s): Kathleen M. Moriarty
- Narrateur(s): Kathleen M. Moriarty
- Durée: 7 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.
-
Transforming Information Security
- Optimizing Five Concurrent Trends to Reduce Resource Drain
- Narrateur(s): Kathleen M. Moriarty
- Durée: 7 h et 23 min
- Date de publication: 2025-06-16
- Langue: Anglais
-
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- Auteur(s): Gwen Bettwy, Mark Williams, Mike Beevers
- Narrateur(s): Gwen Bettwy
- Durée: 5 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- Narrateur(s): Gwen Bettwy
- Durée: 5 h et 55 min
- Date de publication: 2021-08-03
- Langue: Anglais
-
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
National Security
- A Jericho Quinn Thriller, Book 1
- Auteur(s): Marc Cameron
- Narrateur(s): Tom Weiner
- Durée: 8 h et 56 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Warning: The next terrorist attack on American soil is coming...sooner than you think. They can strike anytime, anywhere. A public landmark. A suburban shopping mall. And now, the human body itself. Three Middle Eastern terrorists have been injected with a biological weapon, human time bombs unleashed on American soil. They are prepared to die. To spread their disease. To annihilate millions. If America hopes to fight this enemy from within, we need a new kind of weapon. Meet Special Agent Jericho Quinn. Air Force veteran. Champion boxer. Trained assassin.
-
National Security
- A Jericho Quinn Thriller, Book 1
- Narrateur(s): Tom Weiner
- Série: Jericho Quinn, Livre 1
- Durée: 8 h et 56 min
- Date de publication: 2020-08-04
- Langue: Anglais
-
Warning: The next terrorist attack on American soil is coming...sooner than you think. They can strike anytime, anywhere. A public landmark. A suburban shopping mall. And now, the human body itself. Three Middle Eastern terrorists have been injected with a biological weapon....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- Auteur(s): Mike Chapple, David Seidl
- Narrateur(s): Ray Greenley
- Durée: 24 h et 52 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You'll explore general security concepts, threats, vulnerabilities, mitigations, security architecture and operations, as well as security program management and oversight.
-
-
great coverage of topics
- Écrit par Amazon Customer le 2025-04-07
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- Narrateur(s): Ray Greenley
- Durée: 24 h et 52 min
- Date de publication: 2024-09-03
- Langue: Anglais
-
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
30,69 $ ou gratuit avec l'essai de 30 jours
-
-
-
North Korea's Hidden Revolution
- How the Information Underground Is Transforming a Closed Society
- Auteur(s): Jieun Baek
- Narrateur(s): Caroline McLaughlin
- Durée: 7 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
One of the least understood countries in the world, North Korea has long been known for its repressive regime. Yet it is far from being an impenetrable black box. Media flows covertly into the country, and fault lines are appearing in the government's sealed informational borders. Drawing on deeply personal interviews with North Korean defectors from all walks of life, ranging from propaganda artists to diplomats, Jieun Baek tells the story of North Korea's information underground.
-
North Korea's Hidden Revolution
- How the Information Underground Is Transforming a Closed Society
- Narrateur(s): Caroline McLaughlin
- Durée: 7 h et 31 min
- Date de publication: 2016-11-15
- Langue: Anglais
- One of the least understood countries in the world, North Korea has long been known for its repressive regime. Yet it is far from being an impenetrable black box. Media flows covertly....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,92 $ ou gratuit avec l'essai de 30 jours
-
-
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Date de publication: 2024-05-28
- Langue: Anglais
-
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Russian Understanding of War
- Blurring the Lines Between War and Peace
- Auteur(s): Oscar Jonsson
- Narrateur(s): Michael Page
- Durée: 7 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book analyzes the evolution of Russian military thought and how Russia's current thinking about war is reflected in recent crises. What Jonsson reveals is that Russia's conception of the very nature of war is now changing, as Russian elites see information warfare and political subversion as the most important ways to conduct contemporary war. Since information warfare and political subversion are below the traditional threshold of armed violence, this has blurred the boundaries between war and peace.
-
The Russian Understanding of War
- Blurring the Lines Between War and Peace
- Narrateur(s): Michael Page
- Durée: 7 h et 29 min
- Date de publication: 2020-10-27
- Langue: Anglais
-
This book analyzes the evolution of Russian military thought and how Russia's current thinking about war is reflected in recent crises. What Jonsson reveals is that Russian elites see information warfare and political subversion as the most important ways to conduct contemporary war....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
NIST Cybersecurity Framework (CSF) for Information Systems Security
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 8 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The NIST Cybersecurity Framework, intelligently designed to synchronize with top-tier industry practices, is a treasure trove for all cybersecurity enthusiasts, IT professionals, or organizational leaders determined to enhance their information systems security. This book, with its ability to translate complex concepts into accessible lessons, has the power to elevate beginners into adept cybersecurity practitioners.
-
NIST Cybersecurity Framework (CSF) for Information Systems Security
- Narrateur(s): Kim Pepper
- Série: NIST Cybersecurity Framework, Livre 1
- Durée: 8 h et 25 min
- Date de publication: 2023-08-09
- Langue: Anglais
-
The NIST Cybersecurity Framework, intelligently designed to synchronize with top-tier industry practices, is a treasure trove for all cybersecurity enthusiasts, IT professionals, or organizational leaders determined to enhance their information systems security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Information Security and Privacy Quick Reference
- The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer
- Auteur(s): Joe Shelley, Mike Chapple, James Michael Stewart
- Narrateur(s): Rick Barr
- Durée: 8 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Information Security and Privacy Quick Reference: The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer is an updated, convenient, and accurate desk reference for information privacy practitioners who need fast and easy access to the latest guidance, laws, and standards that apply in their field. This book is the most effective resource for information security professionals who need immediate and correct solutions to common and rarely encountered problems.
-
Information Security and Privacy Quick Reference
- The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer
- Narrateur(s): Rick Barr
- Durée: 8 h et 30 min
- Date de publication: 2025-08-26
- Langue: Anglais
-
A fast, accurate, and up-to-date desk reference for information security and privacy practitioners everywhere.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,53 $ ou écoutez-le à sa sortie avec l'abonnement
-
-
-
Information Is Power
- World Keeper, Book 9
- Auteur(s): Justin Miller
- Narrateur(s): Stephen Bel Davies
- Durée: 30 h et 10 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Void has shown itself, forcing Dale to confront an all new type of enemy, one that cannot merely be beaten back with physical force. He must adapt to the rules of these new monsters and learn how to overcome them, while keeping the threats from within his own world from destroying everything.
-
Information Is Power
- World Keeper, Book 9
- Narrateur(s): Stephen Bel Davies
- Série: World Keeper, Livre 9
- Durée: 30 h et 10 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The Void has shown itself, forcing Dale to confront a new type of enemy, one that cannot merely be beaten back with physical force. He must adapt to the rules of these new monsters and learn how to overcome them, while keeping the threats from his own world from destroying everything....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
38,97 $ ou gratuit avec l'essai de 30 jours
-
-
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Auteur(s): Steve Watkins
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022.
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Date de publication: 2023-09-06
- Langue: Anglais
-
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
16,38 $ ou gratuit avec l'essai de 30 jours
-
-
-
Underground Storage Vaults: Protecting Priceless Information
- High Security
- Auteur(s): Kaitlyn Duling
- Narrateur(s): uncredited
- Durée: 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
How can important information and valuable items be kept safe as years pass? Many of these items are stored in underground vaults, including recordings and photos from U.S. history, important documents, and more. Locks, guards, secret passwords, and technology all play a part in the protection of the items.
-
Underground Storage Vaults: Protecting Priceless Information
- High Security
- Narrateur(s): uncredited
- Durée: 6 min
- Date de publication: 2024-04-24
- Langue: Anglais
-
How can important information and valuable items be kept safe as years pass? Many of these items are stored in underground vaults, including recordings and photos from U.S. history, important documents, and more.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
7,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Active Measures
- The Secret History of Disinformation and Political Warfare
- Auteur(s): Thomas Rid
- Narrateur(s): Derek Perkins
- Durée: 14 h et 45 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We live in the age of disinformation - of organized deception. Spy agencies pour vast resources into hacking, leaking, and forging data, often with the goal of weakening the very foundation of liberal democracy: trust in facts. Thomas Rid, a renowned expert on technology and national security, was one of the first to sound the alarm, even before the 2016 election. But this is not new. The story of modern disinformation begins with the clash between communism and capitalism after the Russian Revolution.
-
-
Biased and partial analysis
- Écrit par A humble student le 2024-01-05
-
Active Measures
- The Secret History of Disinformation and Political Warfare
- Narrateur(s): Derek Perkins
- Durée: 14 h et 45 min
- Date de publication: 2020-04-21
- Langue: Anglais
-
This revelatory and dramatic history of disinformation traces the rise of secret organized deception operations from the interwar period to contemporary internet troll farms....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
32,60 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- Auteur(s): Phillip L. Wylie, Kim Crawley
- Narrateur(s): Matthew Josdal
- Durée: 6 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- Narrateur(s): Matthew Josdal
- Durée: 6 h et 22 min
- Date de publication: 2021-03-30
- Langue: Anglais
-
Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
17,81 $ ou gratuit avec l'essai de 30 jours
-
-
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Auteur(s): David Rauschendorfer
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every organization today faces an ever-changing set of threats in this digital landscape. Understanding how to develop a functional information security program to protect your organization’s reputation and brand from being tarnished due to a breach of your company’s sensitive information is more critical than ever. Developing a functional program that sets up the best information security practices across the organization’s operational workflows, is the leading practice for protecting against a possible breach.
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Date de publication: 2021-11-12
- Langue: Anglais
-
Every organization today faces an ever-changing set of threats in this digital landscape....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-