Computer Security
-
-
Cloud Security for Dummies
- Auteur(s): Ted Coombs
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security for Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom up.
-
Cloud Security for Dummies
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Date de publication: 2022-03-29
- Langue: Anglais
-
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 38,97$ ou 1 crédit
Prix réduit: 38,97$ ou 1 crédit
-
-
-
Viral Parenting
- A Guide to Setting Boundaries, Building Trust, and Raising Responsible Kids in an Online World
- Auteur(s): Mindy McKnight
- Narrateur(s): Mindy McKnight, Shaun McKnight, Brooklyn McKnight, Autres
- Durée: 7 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Viral Parenting is a guide to raising responsible, safe, and communicative kids in the digital world. Mindy shares practical tools for having honest conversations with kids of all ages about privacy, bullying, respectfulness, and family time while emphasizing the importance of trust and open communication. These strategies are timeless - whether applied to texting, snapping, Facebooking, kiking, or whatever social media platforms await us in the future, this book is ultimately about teaching children about personal responsibility and safety.
-
Viral Parenting
- A Guide to Setting Boundaries, Building Trust, and Raising Responsible Kids in an Online World
- Narrateur(s): Mindy McKnight, Shaun McKnight, Brooklyn McKnight, Bailey McKnight
- Durée: 7 h et 28 min
- Date de publication: 2019-04-30
- Langue: Anglais
-
Viral Parenting is a guide to raising responsible, safe, and communicative kids in the digital world. Mindy shares practical tools for having honest conversations with kids of all ages about privacy, bullying, respectfulness, and family time....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,23$ ou 1 crédit
Prix réduit: 25,23$ ou 1 crédit
-
-
-
Practical Cloud Security
- A Guide for Secure Design and Deployment (2nd Edition)
- Auteur(s): Chris Dotson
- Narrateur(s): Stephen Caffrey
- Durée: 11 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.
-
Practical Cloud Security
- A Guide for Secure Design and Deployment (2nd Edition)
- Narrateur(s): Stephen Caffrey
- Durée: 11 h et 18 min
- Date de publication: 2024-09-24
- Langue: Anglais
-
In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Auteur(s): Jack Jones
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want, do what you want, and buy whatever you want. But there is so much more to the deep web than the Hollywood picture of a lawless frontier land. Sure, there are illicit elements to it. It can be a dangerous place if you don't know what you are doing. But, with all that, it should be remembered what the deep web is all about - it's about freedom of speech in a world of censorship and political correctness.
-
-
Provides some practical information
- Écrit par Mary-Anne le 2018-12-15
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Date de publication: 2017-07-14
- Langue: Anglais
- It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want and buy whatever you want....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
Circuit Engineering + Cryptography + CompTIA A+
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is circuit engineering what you want to learn? Always wondered how one becomes an electrical engineer? Do semiconductors and circuit boards interest you? Download Circuit Engineering + Cryptography + CompTIA A+ to discover everything you need to know about basic electronics. You'll learn step by step how to increase your electrical skills, the anatomy of a circuit, and all your basic knowledge in one download!
-
Circuit Engineering + Cryptography + CompTIA A+
- Narrateur(s): Millian Quinteros
- Durée: 4 h et 23 min
- Date de publication: 2016-03-02
- Langue: Anglais
- You'll learn step by step how to increase your electrical skills, the anatomy of a circuit, and all your basic knowledge in one download....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,10$ ou 1 crédit
Prix réduit: 20,10$ ou 1 crédit
-
-
-
Secret Key Cryptography
- Ciphers, from Simple to Unbreakable
- Auteur(s): Frank Rubin
- Narrateur(s): Christopher Kendrick
- Durée: 16 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Secret Key Cryptography gives you a toolbox of cryptographic techniques and secret key methods. The audiobook’s simple, non-technical language is easy to understand and is accessible for any listener even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches including a never-before-seen way to implement the uncrackable one-time pad algorithm. Whoever you are, this audiobook is for you!
-
Secret Key Cryptography
- Ciphers, from Simple to Unbreakable
- Narrateur(s): Christopher Kendrick
- Durée: 16 h et 49 min
- Date de publication: 2023-01-26
- Langue: Anglais
-
Explore the fascinating and rich world of Secret Key Cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes including 30 unbreakable methods.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
The CISO Guide to Zero Trust Security
- Auteur(s): Raj Badhwar
- Narrateur(s): Michelle Badhwar
- Durée: 6 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Zero Trust Security framework provides essential security controls to remediate and mitigate advanced cyber threats from compromising our applications and systems. The leaders of our nation, and the business and technology leaders of our firms, have put in a call to arms for CISOs and other security professionals to lead this effort to secure our systems and applications from cyber-attackers.
-
The CISO Guide to Zero Trust Security
- Narrateur(s): Michelle Badhwar
- Durée: 6 h et 41 min
- Date de publication: 2022-08-12
- Langue: Anglais
-
The Zero Trust Security framework provides essential security controls to remediate and mitigate advanced cyber threats from compromising our applications and systems....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Building a Career in Cybersecurity
- The Strategy and Skills You Need to Succeed
- Auteur(s): Yuri Diogenes
- Narrateur(s): Michael F. Walworth
- Durée: 4 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity is one of the world’s fastest growing, most exciting fields—but that doesn’t mean it’s easy to enter the industry and succeed. Now there’s a complete guide to creating a great cybersecurity career, whether you’re migrating to cybersecurity from another field or already a cybersecurity professional.
-
Building a Career in Cybersecurity
- The Strategy and Skills You Need to Succeed
- Narrateur(s): Michael F. Walworth
- Durée: 4 h et 15 min
- Date de publication: 2023-11-16
- Langue: Anglais
-
Cybersecurity is one of the world’s fastest growing, most exciting fields—but that doesn’t mean it’s easy to enter the industry and succeed....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Crash Override
- How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate
- Auteur(s): Zoë Quinn
- Narrateur(s): Zoë Quinn
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
You've heard the stories about the dark side of the internet—hackers, #gamergate, anonymous mobs attacking an unlucky victim, and revenge porn—but they remain just that: Stories. Surely these things would never happen to you. Zoe Quinn used to feel the same way. She is a video game developer whose ex-boyfriend published a crazed blog post cobbled together from private information, half-truths, and outright fictions, along with a rallying cry to the online hordes to go after her. They answered in the form of a so-called movement known as #gamergate.
-
Crash Override
- How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate
- Narrateur(s): Zoë Quinn
- Durée: 7 h et 9 min
- Date de publication: 2017-09-05
- Langue: Anglais
-
You've heard the stories about the dark side of the internet—hackers, #gamergate, anonymous mobs attacking an unlucky victim, and revenge porn—but they remain just that: Stories. Surely these things would never happen to you. Zoe Quinn used to feel the same way....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 38,31$ ou 1 crédit
Prix réduit: 38,31$ ou 1 crédit
-
-
-
Dot Con
- The Art of Scamming a Scammer
- Auteur(s): James Veitch
- Narrateur(s): James Veitch, Naomi Petersen
- Durée: 2 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Nigerian prince eager to fork over his inheritance, the family friend stranded unexpectedly in Norway, the lonely Russian beauty looking for love...they spam our inboxes with their hapless pleas for help, money, and your social security number. In Dot Con, Veitch finally answers the question: What would happen if you replied?
-
-
Hilarious
- Écrit par Amazon Customer le 2022-08-19
-
Dot Con
- The Art of Scamming a Scammer
- Narrateur(s): James Veitch, Naomi Petersen
- Durée: 2 h et 28 min
- Date de publication: 2020-06-02
- Langue: Anglais
-
The Nigerian prince eager to fork over his inheritance, the family friend stranded unexpectedly in Norway, the lonely Russian beauty looking for love...they spam our inboxes with their hapless pleas for help, money, and your social security number....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 15,14$ ou 1 crédit
Prix réduit: 15,14$ ou 1 crédit
-
-
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing. Authored by seasoned cybersecurity experts, this comprehensive book provides an immersive journey through the critical principles, methodologies, and practical applications needed to navigate the CompTIA Pentest+ Certification.
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 8 min
- Date de publication: 2023-12-07
- Langue: Anglais
-
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Digital Fortress
- Navigating Cyber Threats: Mastering the Art of Online Security and Privacy
- Auteur(s): David Goodin
- Narrateur(s): Siah Clark
- Durée: 3 h et 48 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This essential guide is crafted for those who find themselves intrigued by the origins of malware or seeking effective strategies to fend off online dangers. Whether your knowledge of computers is minimal or you possess a foundational understanding, this book stands as a beacon, illuminating the often intimidating realm of computer security.
-
Digital Fortress
- Navigating Cyber Threats: Mastering the Art of Online Security and Privacy
- Narrateur(s): Siah Clark
- Durée: 3 h et 48 min
- Date de publication: 2024-03-20
- Langue: Anglais
-
This essential guide is crafted for those who find themselves intrigued by the origins of malware or seeking effective strategies to fend off online dangers.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Auteur(s): Jack Jones
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
What do you know about hacking a computer system? If you are like most of us, you can't even get into your own computer if you've forgotten the password. The good news is that hacking is actually a lot easier than you think, and anyone can learn how to do it. As long as you are willing to do the work and to work through the steps patiently, you will also be able to hack the systems that you want to.
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Date de publication: 2017-09-25
- Langue: Anglais
- If you are like most of us, you can't even get into your own computer if you've forgotten the password....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34$ ou 1 crédit
Prix réduit: 9,34$ ou 1 crédit
-
-
-
Cybersecurity Certifications for Beginners 2023
- Your Comprehensive Guide into the World of Cyber Security Certifications
- Auteur(s): Taimur Ijlal
- Narrateur(s): Taylor Perkinson
- Durée: 1 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In a rapidly evolving digital landscape, the cybersecurity market is set to skyrocket, reaching an astounding USD 424.97 Billion by 2030. Amidst this growth, certifications stand out as the golden ticket for those eager to penetrate this lucrative field. Yet, with a plethora of options, where does one even begin?
-
Cybersecurity Certifications for Beginners 2023
- Your Comprehensive Guide into the World of Cyber Security Certifications
- Narrateur(s): Taylor Perkinson
- Durée: 1 h et 53 min
- Date de publication: 2023-08-18
- Langue: Anglais
-
In a rapidly evolving digital landscape, the cybersecurity market is set to skyrocket, reaching an astounding USD 424.97 Billion by 2030. Amidst this growth, certifications stand out as the golden ticket for those eager to penetrate this lucrative field....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- Auteur(s): George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrateur(s): Lyle Blaker
- Durée: 7 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- Narrateur(s): Lyle Blaker
- Durée: 7 h et 38 min
- Date de publication: 2024-06-25
- Langue: Anglais
-
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Date de publication: 2022-04-04
- Langue: Anglais
-
This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
A Concise Introduction to ISO/IEC 27001:2013
- Auteur(s): ITSM Press
- Narrateur(s): Tom Howery
- Durée: 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a concise introductory guide to the information security management systems (ISMS) standard ISO/IEC 27001:2013....
-
A Concise Introduction to ISO/IEC 27001:2013
- Narrateur(s): Tom Howery
- Durée: 28 min
- Date de publication: 2018-12-19
- Langue: Anglais
-
This is a concise introductory guide to the information security management systems (ISMS) standard ISO/IEC 27001:2013.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
The Social Engineer's Playbook: A Practical Guide to Pretexting
- Auteur(s): Jeremiah Talamantes
- Narrateur(s): Tom Taverna
- Durée: 3 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others. This book covers an introduction to tools, such as: Maltego, Social Engineer Toolkit, Dradis, Metasploit, and Kali Linux among others. Crucial to any social engineering test is the information used to build it. Discover the most valuable sources of intel and how to put them to use.
-
The Social Engineer's Playbook: A Practical Guide to Pretexting
- Narrateur(s): Tom Taverna
- Durée: 3 h
- Date de publication: 2017-11-06
- Langue: Anglais
-
The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- Auteur(s): Taimur Ijlal
- Narrateur(s): Craig Neutzling
- Durée: 1 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- Narrateur(s): Craig Neutzling
- Durée: 1 h et 31 min
- Date de publication: 2023-07-22
- Langue: Anglais
-
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
- Auteur(s): National Security Agency, CISA
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to highlight the most common cybersecurity misconfigurations in large organizations, and detail the tactics, techniques, and procedures (TTPs) actors use to exploit these misconfigurations. Through NSA and CISA Red and Blue team assessments, as well as through the activities of NSA and CISA Hunt and Incident Response teams, the agencies identified the following 10 most common network misconfigurations.
-
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Date de publication: 2023-10-19
- Langue: Anglais
-
The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to highlight the most common cybersecurity misconfigurations in large organizations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-