Computer Hacking
-
-
The Travel Hacking Pocket Guide
- Protect Your Family and Business from Cyber Attacks
- Auteur(s): Lee Felsin
- Narrateur(s): John Taylor
- Durée: 3 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every chapter in this audiobook contains examples and definitions that are easy to follow and understand. You will learn the basics of hacking, how to operate and use terminal commands, followed by an extensive guide on how to perform all the steps of a penetration test.
-
The Travel Hacking Pocket Guide
- Protect Your Family and Business from Cyber Attacks
- Narrateur(s): John Taylor
- Durée: 3 h et 20 min
- Date de publication: 2020-09-22
- Langue: Anglais
-
Every chapter in this audiobook contains examples and definitions that are easy to follow and understand. You will learn the basics of hacking, how to operate and use terminal commands, followed by an extensive guide on how to perform all the steps of a penetration test....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The Basics of Hacking
- Auteur(s): Teddy Alger
- Narrateur(s): Shafi
- Durée: 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As technology continues to advance, the need for secure systems has become increasingly important. However, with this growth in technology also comes an increase in the threat of cyber-attacks. In order to protect against these threats, it is crucial to have an understanding of the tools used by both ethical and malicious hackers. This audiobook will teach you the basics of hacking so you can protect yourself from the perils of cyber attacks.
-
The Basics of Hacking
- Narrateur(s): Shafi
- Durée: 43 min
- Date de publication: 2023-05-04
- Langue: Anglais
-
As technology continues to advance, the need for secure systems has become increasingly important. This audiobook will teach you the basics of hacking so you can protect yourself from the perils of cyber attacks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 7,00$ ou 1 crédit
Prix réduit: 7,00$ ou 1 crédit
-
-
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Auteur(s): Department of Justice FBI NSA Department of State
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Date de publication: 2023-06-21
- Langue: Anglais
-
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Kali Linux: Testing Your Network
- How to Test Infrastructure Security with Security Testing and Penetration Testing
- Auteur(s): Frank Eltrinos
- Narrateur(s): Rudy Norman
- Durée: 3 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Increasingly, hackers are becoming a bigger problem for both businesses and individuals. If they decide to target your device, you could be locked out of your own systems or lose valuable information. Sadly, many people don’t know how to protect their networks, leaving them open to the stress and anxiety that these attacks can cause. Thankfully, you can learn the skills required to secure your network. This comprehensive audiobook will take you through everything you need to know.
-
Kali Linux: Testing Your Network
- How to Test Infrastructure Security with Security Testing and Penetration Testing
- Narrateur(s): Rudy Norman
- Durée: 3 h et 39 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
Increasingly, hackers are becoming a bigger problem for both businesses and individuals. If they decide to target your device, you could be locked out of your own systems or lose valuable information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The Power of NLP
- Little-Known Strategies to Access Your Mind and Truly Program Yourself Just Like a Computer
- Auteur(s): Joseph Sperry
- Narrateur(s): Bruce Nix
- Durée: 3 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Neuro-Linguistic Programming (NLP) describes how the brain works [neuro], how we use language in different scenarios [linguistic], and how we can master behavior patterns with time [programming]. But more importantly, NLP is the science behind how people work. Good news is, you’re about to learn the essentials about human behavior, how using simple gestures, words, and actions can sway people to your point of view, as well as how to make changes in your lifestyle in order to do all this effectively.
-
The Power of NLP
- Little-Known Strategies to Access Your Mind and Truly Program Yourself Just Like a Computer
- Narrateur(s): Bruce Nix
- Durée: 3 h
- Date de publication: 2020-03-13
- Langue: Anglais
-
NLP is for anyone - but especially for those wanting to see their interpersonal strategies flawlessly executed, influence strengthened, connections made, rapport built, communication mastered, and the world with all its possibilities ready for the taking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Bitcoin Hacking
- Protect Yourself from Hackers by Learning What They Do (Cryptocurrency Book 3)
- Auteur(s): Akito Yamamoto
- Narrateur(s): Marianne
- Durée: 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Protect yourself, and your Bitcoins from hackers, by learning their methods. This book is going to share with you some of the ways that hackers can get your Bitcoins, and do with them as they please. All without a trace of evidence landing back to them. This is all too real. And it goes on daily, as we speak. If you are invested in Bitcoin, or any type of investment, crypto, or not. You should listen to this short, to the point book.
-
Bitcoin Hacking
- Protect Yourself from Hackers by Learning What They Do (Cryptocurrency Book 3)
- Narrateur(s): Marianne
- Série: Cryptocurrency, Livre 3
- Durée: 37 min
- Date de publication: 2020-11-17
- Langue: Anglais
-
Protect yourself, and your Bitcoins from hackers, by learning their methods. This book is going to share with you some of the ways that hackers can get your Bitcoins, and do with them as they please. All without a trace of evidence landing back to them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 1,43$ ou 1 crédit
Prix réduit: 1,43$ ou 1 crédit
-