Computer Security
-
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- Auteur(s): Steven Levy
- Narrateur(s): Rich Miller
- Durée: 14 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- Narrateur(s): Rich Miller
- Durée: 14 h et 2 min
- Date de publication: 2021-04-27
- Langue: Anglais
-
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that affects every citizen in the 21st century....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Auteur(s): Jennifer Bleam
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
What value does managed security bring when there’s no way to promise ROI? How do you convince small business owners to part with their hard-earned revenue when they don’t feel vulnerable to a cyberattack? What is the best way to mitigate your clients’ risk without feeling dishonest or using slimy sales tactics? And could someone please demystify sales and make it easy? This book is the answer to all those questions and more. Forged in the steel of real-world MSP successes and failures, you’ll learn how to sell cybersecurity, simply and easily—even for the techiest tech in the industry.
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Date de publication: 2023-09-18
- Langue: Anglais
-
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Real-World Cryptography
- Auteur(s): David Wong
- Narrateur(s): Derek Dysart
- Durée: 13 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging. This audiobook is a joy to listen to - and it might just save your bacon the next time you’re targeted by an adversary after your data.
-
Real-World Cryptography
- Narrateur(s): Derek Dysart
- Durée: 13 h et 49 min
- Date de publication: 2021-12-08
- Langue: Anglais
-
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Auteur(s): Lester Evans
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? You’re not alone. Half-baked products and services that chip away at your sense of ownership, independence and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers.
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Narrateur(s): Brian R. Scott
- Durée: 3 h et 35 min
- Date de publication: 2019-02-05
- Langue: Anglais
-
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cybersecurity for Beginners Made Easy
- Navigate the Digital Maze With Simple Steps, Real-World Solutions, and Expert Insights to Safeguard Your Online Presence
- Auteur(s): Raiden Tekk
- Narrateur(s): Ben Staab
- Durée: 3 h et 56 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Arm yourself with cybersecurity knowledge and skills to stay safe, informed, and empowered in the digital age. Are you concerned about privacy and cyber attacks in an increasingly complex virtual space? Does integrating cybersecurity solutions into your business seem endlessly daunting and complicated? If so, know you can do plenty to identify, mitigate, and avoid cyber risks. And this book will help you get the ball rolling. It features the powerful SECURE IT framework for simplifying even the most complicated concepts.
-
Cybersecurity for Beginners Made Easy
- Navigate the Digital Maze With Simple Steps, Real-World Solutions, and Expert Insights to Safeguard Your Online Presence
- Narrateur(s): Ben Staab
- Durée: 3 h et 56 min
- Date de publication: 2025-01-13
- Langue: Anglais
-
Arm yourself with cybersecurity knowledge and skills to stay safe, informed, and empowered in the digital age.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Ten Steps to ITSM Success
- Auteur(s): Timothy Rogers, Angelo Esposito
- Narrateur(s): Peter Silverleaf
- Durée: 6 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As organizations seek to boost revenue, cut costs, and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. Ten Steps to ITSM Success helps IT to prepare for this role by providing a detailed and practical guide to implementing ITSM best practices. It is aimed at ITSM practitioners and consultants, but will also be of interest to IT directors and C-suite executives looking to transform the role of IT into a value-creating business partner.
-
Ten Steps to ITSM Success
- Narrateur(s): Peter Silverleaf
- Durée: 6 h et 42 min
- Date de publication: 2018-12-10
- Langue: Anglais
-
As organizations seek to boost revenue, cut costs, and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. This guide helps IT to prepare for this role by providing a detailed and practical guide to implementing ITSM best practices....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
The Wires of War
- Technology and the Global Struggle for Power
- Auteur(s): Jacob Helberg
- Narrateur(s): Jesse Einstein
- Durée: 11 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
From 2016 to 2020, Jacob Helberg led Google’s global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war between democracy and autocracy.
-
-
Excellent Review of Current Situation
- Écrit par Ian R. Graham le 2022-07-02
-
The Wires of War
- Technology and the Global Struggle for Power
- Narrateur(s): Jesse Einstein
- Durée: 11 h et 32 min
- Date de publication: 2021-10-12
- Langue: Anglais
-
From 2016 to 2020, Jacob Helberg led Google’s global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,99$ ou 1 crédit
Prix réduit: 26,99$ ou 1 crédit
-
-
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Auteur(s): Perry Carpenter, Kai Roer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
Really good book, but lots of diagrams
- Écrit par Vince le 2022-12-16
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven insights into how to transform your organization's security culture and reduce human risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Mastering Cloud Architecture
- Strategies and Best Practices for Scalability, Cost Savings, and Security: Cloud-Based Infrastructure for High Availability, Performance, and Cost Optimization
- Auteur(s): Bruno Dossantos
- Narrateur(s): Brian Morrow
- Durée: 2 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cloud computing has transformed the way we think about technology infrastructure and application deployment. The benefits of cloud computing, such as scalability, cost savings, and flexibility, have made it a popular choice for organizations of all sizes. This book aims to provide an in-depth understanding of cloud computing architecture, covering the core concepts, principles, and best practices. It will help you gain a comprehensive understanding of cloud computing, from the basics of virtualization to advanced topics such as cloud-native architecture, AI, and edge computing.
-
Mastering Cloud Architecture
- Strategies and Best Practices for Scalability, Cost Savings, and Security: Cloud-Based Infrastructure for High Availability, Performance, and Cost Optimization
- Narrateur(s): Brian Morrow
- Durée: 2 h et 44 min
- Date de publication: 2023-11-13
- Langue: Anglais
-
Cloud computing has transformed the way we think about technology infrastructure and application deployment. The benefits of cloud computing, such as scalability, cost savings, and flexibility, have made it a popular choice for organizations of all sizes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Black Code
- Surveillance, Privacy, and the Dark Side of the Internet (Expanded Edition)
- Auteur(s): Ronald J. Deibert
- Narrateur(s): Ronald J. Deibert
- Durée: 9 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain. In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what's at stake for Internet users and citizens.
-
Black Code
- Surveillance, Privacy, and the Dark Side of the Internet (Expanded Edition)
- Narrateur(s): Ronald J. Deibert
- Durée: 9 h et 13 min
- Date de publication: 2017-09-04
- Langue: Anglais
- Cyberspace is all around us. We depend on it for everything we do....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,82$ ou 1 crédit
Prix réduit: 26,82$ ou 1 crédit
-
-
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Auteur(s): George Finney, John Kindervag - foreword
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Date de publication: 2022-10-04
- Langue: Anglais
-
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
CC Certified in Cybersecurity All-in-One Exam Guide
- Auteur(s): Jordan Genung, Steven Bennett
- Narrateur(s): Mike Chamberlain
- Durée: 11 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Take the Certified in Cybersecurity exam from (ISC)2 with confidence using the information contained in this comprehensive study guide. Written by a pair of cybersecurity experts and successful trainers, CC Certified in Cybersecurity All-in-One Exam Guide offers background material, detailed examples, and over 200 practice questions.
-
CC Certified in Cybersecurity All-in-One Exam Guide
- Narrateur(s): Mike Chamberlain
- Durée: 11 h et 42 min
- Date de publication: 2024-07-09
- Langue: Anglais
-
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,30$ ou 1 crédit
Prix réduit: 26,30$ ou 1 crédit
-
-
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Date de publication: 2024-05-28
- Langue: Anglais
-
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The Cyber Risk Handbook
- Creating and Measuring Effective Cybersecurity Capabilities
- Auteur(s): Domenic Antonucci
- Narrateur(s): Jon Vertullo
- Durée: 11 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Cyber Risk Handbook is the practitioner's guide to implementing, measuring, and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations and cross-functional solutions for enterprise-wide improvement.
-
The Cyber Risk Handbook
- Creating and Measuring Effective Cybersecurity Capabilities
- Narrateur(s): Jon Vertullo
- Durée: 11 h et 59 min
- Date de publication: 2024-11-12
- Langue: Anglais
-
The Cyber Risk Handbook is the practitioner's guide to implementing, measuring, and improving the counter-cyber capabilities of the modern enterprise.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Auteur(s): Prabath Siriwardena, Nuwan Dias
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication.
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Date de publication: 2021-03-17
- Langue: Anglais
-
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53$ ou 1 crédit
Prix réduit: 37,53$ ou 1 crédit
-
-
-
Hack Proof
- A Guide to Cybersecurity for Your Business
- Auteur(s): Sergey Poltev
- Narrateur(s): Ethan Walsh
- Durée: 3 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
You need to understand what’s come before so that you can guard against it happening to you… and you need to know exactly what to do to make sure your business is secure. You also need to understand exactly what your cybersecurity status is right now so you can pinpoint the holes that need patching… and the chances are, there’s more to patch up than you realize. Because here’s the kicker: Technology is vital to the success of your company – and that means you have to keep it safe.
-
-
Technology
- Écrit par Joseph Mendoza le 2024-08-12
-
Hack Proof
- A Guide to Cybersecurity for Your Business
- Narrateur(s): Ethan Walsh
- Durée: 3 h et 47 min
- Date de publication: 2024-07-26
- Langue: Anglais
-
You need to understand what’s come before so that you can guard against it happening to you… and you need to know exactly what to do to make sure your business is secure.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Auteur(s): Sean D. Mack
- Narrateur(s): William Sarris
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The DevSecOps Playbook: Deliver Continuous Security at Speed, the chief information and information security officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You'll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You'll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks.
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Narrateur(s): William Sarris
- Durée: 7 h et 9 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
An essential and up-to-date guide to DevSecOps....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Auteur(s): Anthony Hack
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you. This audiobook includes: SQL Computer Programming for Beginners, Python for Beginners, Kali Linux and Hacking with Kali Linux.
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Date de publication: 2020-09-18
- Langue: Anglais
-
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Auteur(s): Andy Greenberg
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Date de publication: 2012-09-17
- Langue: Anglais
- The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,04$ ou 1 crédit
Prix réduit: 37,04$ ou 1 crédit
-
-
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- Auteur(s): Jake T. Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies. Each question is accompanied by detailed explanations and insights into the reasoning behind the correct answers, helping you grasp the underlying concepts thoroughly.
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 1 min
- Date de publication: 2023-12-13
- Langue: Anglais
-
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-