Computer Hacking
-
-
Bitcoin Hacking
- Protect Yourself from Hackers by Learning What They Do (Cryptocurrency Book 3)
- Auteur(s): Akito Yamamoto
- Narrateur(s): Marianne
- Durée: 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Protect yourself, and your Bitcoins from hackers, by learning their methods. This book is going to share with you some of the ways that hackers can get your Bitcoins, and do with them as they please. All without a trace of evidence landing back to them. This is all too real. And it goes on daily, as we speak. If you are invested in Bitcoin, or any type of investment, crypto, or not. You should listen to this short, to the point book.
-
Bitcoin Hacking
- Protect Yourself from Hackers by Learning What They Do (Cryptocurrency Book 3)
- Narrateur(s): Marianne
- Série: Cryptocurrency, Livre 3
- Durée: 37 min
- Date de publication: 2020-11-17
- Langue: Anglais
-
Protect yourself, and your Bitcoins from hackers, by learning their methods. This book is going to share with you some of the ways that hackers can get your Bitcoins, and do with them as they please. All without a trace of evidence landing back to them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 1,43$ ou 1 crédit
Prix réduit: 1,43$ ou 1 crédit
-
-
-
World War ‘D’
- The Intersection of Cyber and Biological Pandemics
- Auteur(s): Christopher Rence
- Narrateur(s): Liam Alan
- Durée: 2 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Life has never been easier thanks to the advancement of technology. However, with all new technological advancements also come new risks. The most drastically increasing issue in the world today is not biological warfare, but cyber warfare. Data has become the single most valuable commodity in today’s world, and, of course, there are always people lurking around the corner, trying to get their hands on it.
-
World War ‘D’
- The Intersection of Cyber and Biological Pandemics
- Narrateur(s): Liam Alan
- Durée: 2 h et 22 min
- Date de publication: 2024-06-04
- Langue: Anglais
-
Life has never been easier thanks to the advancement of technology. However, with all new technological advancements also come new risks. The most drastically increasing issue in the world today is not biological warfare, but cyber warfare.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 15,15$ ou 1 crédit
Prix réduit: 15,15$ ou 1 crédit
-
-
-
Cybersecurity Hacking Guide
- A Guide to Wireless Penetration
- Auteur(s): Lei Felsen
- Narrateur(s): Steve Baughn
- Durée: 3 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It's no secret that computers are insecure. Stories like the recent Facebook hack and the hacking of government agencies are just the tip of the iceberg because hacking is taking over the world. With more and more people moving online and doing almost any task that they can there, it is likely that hacking is just going to increase over time. Our personal, financial, and business information is all found online, and this is a big goldmine for hackers all throughout the world.
-
Cybersecurity Hacking Guide
- A Guide to Wireless Penetration
- Narrateur(s): Steve Baughn
- Durée: 3 h et 20 min
- Date de publication: 2020-09-22
- Langue: Anglais
-
It's no secret that computers are insecure. Stories like the recent Facebook hack and the hacking of government agencies are just the tip of the iceberg because hacking is taking over the world....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
- Auteur(s): Attila Kovacs
- Narrateur(s): J. Matyas
- Durée: 3 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you want to learn how to build a pen test lab, but you don’t know where to start? Do you want a practical book that explains step by step how to get going? Do you want to become an ethical hacker or pen tester? If the answer is yes to the above questions, this audiobook is for you. Buy this audiobook now, and get started today!
-
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
- Narrateur(s): J. Matyas
- Durée: 3 h et 4 min
- Date de publication: 2019-09-04
- Langue: Anglais
-
Do you want to learn how to build a pen test lab, but you don’t know where to start? Do you want a practical book that explains step by step how to get going? Do you want to become an ethical hacker or pen tester? If the answer is yes to the above questions, this audiobook is for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 14,62$ ou 1 crédit
Prix réduit: 14,62$ ou 1 crédit
-
-
-
#HACKED2
- Practical Guidance for Dealing with Threats to Your Business and Privacy
- Auteur(s): Albert E. Whale, Thomas Albert, Chuck Brooks, Autres
- Narrateur(s): David Roth
- Durée: 5 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
#HACKED2 is the follow-up to an award-winning book #HACKED, that was written with industry leaders in cybersecurity. It offers practical advice about what you can do if your business or privacy has been threatened, but it also provides multiple viewpoints on how these issues are being addressed across various fields around the globe - making this resource essential for anyone who wants better awareness of global threats faced today!
-
#HACKED2
- Practical Guidance for Dealing with Threats to Your Business and Privacy
- Narrateur(s): David Roth
- Durée: 5 h et 8 min
- Date de publication: 2024-03-27
- Langue: Anglais
-
#HACKED2 is the follow-up to an award-winning book #HACKED, that was written with industry leaders in cybersecurity. It offers practical advice about what you can do if your business or privacy has been threatened.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
The Dark Side of the Hacking World
- What You Need to Know to Guard Your Precious Assets and Remain Safe
- Auteur(s): Mike Mason
- Narrateur(s): Jim D Johnston
- Durée: 3 h et 52 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hackers have always been a closed, secretive circle, wary of infiltrators and keeping their secrets completely hidden from the public eye until now! This book blows the lid open on the dark side of the hacking world, bringing all of the shadowy secrets, tools of the trade, malicious methods, and high-stakes multi-millionaire lifestyles of hackers out into the open! Each chapter gives you unprecedented access to the cunning tricks, psychological manipulation, and malware that hackers could be using against you right now!
-
The Dark Side of the Hacking World
- What You Need to Know to Guard Your Precious Assets and Remain Safe
- Narrateur(s): Jim D Johnston
- Durée: 3 h et 52 min
- Date de publication: 2016-01-12
- Langue: Anglais
- This book brings all of the shadowy secrets, tools of the trade, malicious methods, and high-stakes multi-millionaire lifestyles of hackers out into the open....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,78$ ou 1 crédit
Prix réduit: 19,78$ ou 1 crédit
-
-
-
The Travel Hacking Pocket Guide
- Protect Your Family and Business from Cyber Attacks
- Auteur(s): Lee Felsin
- Narrateur(s): John Taylor
- Durée: 3 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every chapter in this audiobook contains examples and definitions that are easy to follow and understand. You will learn the basics of hacking, how to operate and use terminal commands, followed by an extensive guide on how to perform all the steps of a penetration test.
-
The Travel Hacking Pocket Guide
- Protect Your Family and Business from Cyber Attacks
- Narrateur(s): John Taylor
- Durée: 3 h et 20 min
- Date de publication: 2020-09-22
- Langue: Anglais
-
Every chapter in this audiobook contains examples and definitions that are easy to follow and understand. You will learn the basics of hacking, how to operate and use terminal commands, followed by an extensive guide on how to perform all the steps of a penetration test....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Facebook Growth Hacking: How to Correctly Set Up and Maintain Your Facebook Presence and Gain Massive Amounts of Fans
- Social Media Marketing, Volume 4
- Auteur(s): Jeff Abston
- Narrateur(s): Jason Burkhead
- Durée: 1 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Facebook is an active platform for entertainment and news, as well as a social networking place for friends and family. However, the same platform plays an important role for many business owners and marketers in identifying and reaching out to their target audience as well as increasing their sales.
-
Facebook Growth Hacking: How to Correctly Set Up and Maintain Your Facebook Presence and Gain Massive Amounts of Fans
- Social Media Marketing, Volume 4
- Narrateur(s): Jason Burkhead
- Série: Social Media Marketing, Livre 4
- Durée: 1 h et 23 min
- Date de publication: 2018-09-25
- Langue: Anglais
-
Facebook is an active platform for entertainment and news. However, the same platform plays an important role for many business owners and marketers in identifying and reaching out to their target audience as well as increasing their sales....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Auteur(s): L.D. Knowings
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Cyber Warfare in 2022
- Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates
- Auteur(s): Michael A. Goedeker MSc
- Narrateur(s): Mandy Grant-Grierson
- Durée: 3 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It’s 2022. Do you know if your online information is safe? According to a study by the University of Maryland, hackers attack internet-connected computers every 39 seconds. The same technology that’s made information sharing easier has put our privacy at risk more than ever. But it doesn’t stop there. International warfare is now waged on the digital stage, changing how countries influence global conflicts' outcomes. We live in an era of computers, data, and digital connections. This book will give you a better understanding of the current threats and solutions from the world of cyber warfare.
-
Cyber Warfare in 2022
- Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates
- Narrateur(s): Mandy Grant-Grierson
- Durée: 3 h et 19 min
- Date de publication: 2023-11-18
- Langue: Anglais
-
We live in an era of computers, data, and digital connections. This book will give you a better understanding of the current threats and solutions from the world of cyber warfare....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 10,09$ ou 1 crédit
Prix réduit: 10,09$ ou 1 crédit
-
-
-
StopRansomware Guide
- Auteur(s): CISA NSA FBI and Multistate Information Sharing and Analysis Center
- Narrateur(s): Tom Brooks
- Durée: 3 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Over time, malicious actors have adjusted their ransomware tactics to be more destructive and impactful, and have also exfiltrated victim data and pressured victims to pay by threatening to release the stolen data.
-
StopRansomware Guide
- Narrateur(s): Tom Brooks
- Durée: 3 h et 9 min
- Date de publication: 2023-11-08
- Langue: Anglais
-
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Sinister Shackles
- Understanding Ransomware: Data Encryption and Extortion
- Auteur(s): Logan Lockwood
- Narrateur(s): Sean P. Chapman
- Durée: 1 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Arm yourself with proactive measures and best practices to fortify your defenses. With this invaluable knowledge, you will be equipped to safeguard your organization and ensure its resilience in the face of this ever-present danger. The time to act is now—protect your business from the relentless onslaught of ransomware and its sinister shackles.
-
Sinister Shackles
- Understanding Ransomware: Data Encryption and Extortion
- Narrateur(s): Sean P. Chapman
- Durée: 1 h et 39 min
- Date de publication: 2023-08-14
- Langue: Anglais
-
Arm yourself with proactive measures and best practices to fortify your defenses. With this invaluable knowledge, you will be equipped to safeguard your organization and ensure its resilience in the face of this ever-present danger....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Internet of Crimes (German edition)
- Warum wir alle Angst vor Hackern haben sollten
- Auteur(s): Gerald Reischl
- Narrateur(s): Peter Wolter
- Durée: 10 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Das Internet bietet Verbrechern ganz neue Möglichkeiten: Hacker attackieren Bezahlsysteme, beeinflussen Wahlen und ganze Demokratien. Gehackt und erpresst werden nicht nur Konzerne und Internetgrößen wie Facebook oder Microsoft, auch kleine und mittlere Unternehmen sind immer häufiger im Visier der Internetmafia. Jeder, der das Internet nutzt, ob privat oder beruflich, kann Opfer einer Attacke werden.
-
Internet of Crimes (German edition)
- Warum wir alle Angst vor Hackern haben sollten
- Narrateur(s): Peter Wolter
- Durée: 10 h et 20 min
- Date de publication: 2020-09-03
- Langue: Allemand
-
Das Internet bietet Verbrechern ganz neue Möglichkeiten: Hacker attackieren Bezahlsysteme, beeinflussen Wahlen und ganze Demokratien...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 24,07$ ou 1 crédit
Prix réduit: 24,07$ ou 1 crédit
-
-
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Auteur(s): Department of Justice FBI NSA Department of State
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Date de publication: 2023-06-21
- Langue: Anglais
-
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Machine Learning: Your Ultimate Guide on Machine Learning, Agile Project Management, and Hacking
- A Three-Book Bundle
- Auteur(s): Robert Keane
- Narrateur(s): Mike Davis
- Durée: 4 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Your ultimate guide on machine learning, agile project management, and hacking. This audiobook includes three manuscripts! Machine learning, agile project management, and hacking are vital to the world of information technology and have changed drastically in recent years. This guidebook has all the information that you need to learn about some of the most common applications and attacks in the world today as well as some of the things that you can do to protect and educate yourself.
-
Machine Learning: Your Ultimate Guide on Machine Learning, Agile Project Management, and Hacking
- A Three-Book Bundle
- Narrateur(s): Mike Davis
- Durée: 4 h et 27 min
- Date de publication: 2018-01-16
- Langue: Anglais
-
Your ultimate guide on machine learning, agile project management, and hacking. This audiobook includes three manuscripts....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Kali Linux: Testing Your Network
- How to Test Infrastructure Security with Security Testing and Penetration Testing
- Auteur(s): Frank Eltrinos
- Narrateur(s): Rudy Norman
- Durée: 3 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Increasingly, hackers are becoming a bigger problem for both businesses and individuals. If they decide to target your device, you could be locked out of your own systems or lose valuable information. Sadly, many people don’t know how to protect their networks, leaving them open to the stress and anxiety that these attacks can cause. Thankfully, you can learn the skills required to secure your network. This comprehensive audiobook will take you through everything you need to know.
-
Kali Linux: Testing Your Network
- How to Test Infrastructure Security with Security Testing and Penetration Testing
- Narrateur(s): Rudy Norman
- Durée: 3 h et 39 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
Increasingly, hackers are becoming a bigger problem for both businesses and individuals. If they decide to target your device, you could be locked out of your own systems or lose valuable information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The Power of NLP
- Little-Known Strategies to Access Your Mind and Truly Program Yourself Just Like a Computer
- Auteur(s): Joseph Sperry
- Narrateur(s): Bruce Nix
- Durée: 3 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Neuro-Linguistic Programming (NLP) describes how the brain works [neuro], how we use language in different scenarios [linguistic], and how we can master behavior patterns with time [programming]. But more importantly, NLP is the science behind how people work. Good news is, you’re about to learn the essentials about human behavior, how using simple gestures, words, and actions can sway people to your point of view, as well as how to make changes in your lifestyle in order to do all this effectively.
-
The Power of NLP
- Little-Known Strategies to Access Your Mind and Truly Program Yourself Just Like a Computer
- Narrateur(s): Bruce Nix
- Durée: 3 h
- Date de publication: 2020-03-13
- Langue: Anglais
-
NLP is for anyone - but especially for those wanting to see their interpersonal strategies flawlessly executed, influence strengthened, connections made, rapport built, communication mastered, and the world with all its possibilities ready for the taking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Confessions of a CIA Spy
- The Art of Human Hacking
- Auteur(s): Peter Warmka
- Narrateur(s): Gary Williams
- Durée: 3 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies that he and other threat actors use to breach the security of their targets, whether they’re high-profile individuals or entire organizations.
-
Confessions of a CIA Spy
- The Art of Human Hacking
- Narrateur(s): Gary Williams
- Durée: 3 h et 42 min
- Date de publication: 2021-03-02
- Langue: Anglais
-
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies to breach the security of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Kali Linux
- Cybersecurity and Hacking Network
- Auteur(s): Frank Eltrinos
- Narrateur(s): Rudy Norman
- Durée: 7 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you prepared to defend your network from cyberterrorism? Do you understand how the hacking process works? Unfortunately, for many individuals, the answer is no, leaving them exposed to dangers online. The potential dangers of hacking increases as people grow more interconnected. Your business could be held hostage, as you get locked out of your own network. Or, you could have your personal information exposed. Because of these risks, it’s essential that you secure your system.
-
Kali Linux
- Cybersecurity and Hacking Network
- Narrateur(s): Rudy Norman
- Durée: 7 h et 32 min
- Date de publication: 2020-04-20
- Langue: Anglais
-
Are you prepared to defend your network from cyberterrorism? Do you understand how the hacking process works? Unfortunately, for many individuals, the answer is no, leaving them exposed to dangers online....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Cybersecurity
- What You Need to Know About Cybersecurity, Ethical Hacking, Risk Assessment, Social Engineering & How to Defend Yourself from Attacks
- Auteur(s): Ralph Voss
- Narrateur(s): James Powell
- Durée: 4 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber Security may sound like something very complex. However, this book takes a simple, easy to understand approach to breakdown complex topics so that you can understand better and take appropriate action to protect your information once you finish listening.
-
Cybersecurity
- What You Need to Know About Cybersecurity, Ethical Hacking, Risk Assessment, Social Engineering & How to Defend Yourself from Attacks
- Narrateur(s): James Powell
- Durée: 4 h et 12 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
Cyber Security may sound like something very complex. However, this book takes a simple, easy to understand approach to breakdown complex topics so that you can understand better and take appropriate action to protect your information once you finish listening....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-