Computer Security
-
-
Threats
- What Every Engineer Should Learn from Star Wars
- Auteur(s): Adam Shostack
- Narrateur(s): Joe Hempel
- Durée: 10 h et 7 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a structured and memorable way—about the threats to your systems. You'll move from thinking of security issues as clever one-offs and learn to see the patterns they follow.
-
Threats
- What Every Engineer Should Learn from Star Wars
- Narrateur(s): Joe Hempel
- Durée: 10 h et 7 min
- Date de publication: 2023-03-21
- Langue: Anglais
-
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Essentials
- Auteur(s): Charles J. Brooks, Christopher Grow, Philip Craig, Autres
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Version intégrale
-
Au global3
-
Performance3
-
Histoire3
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Awful as an e-book
- Écrit par Mac le 2021-07-25
-
Cybersecurity Essentials
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Date de publication: 2018-10-30
- Langue: Anglais
-
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,53 $ ou gratuit avec l'essai de 30 jours
-
-
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Auteur(s): Andy Greenberg
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Version intégrale
-
Au global2
-
Performance2
-
Histoire2
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Date de publication: 2012-09-17
- Langue: Anglais
- The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
37,04 $ ou gratuit avec l'essai de 30 jours
-
-
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Auteur(s): George Finney, John Kindervag - foreword
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Version intégrale
-
Au global1
-
Performance1
-
Histoire1
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Date de publication: 2022-10-04
- Langue: Anglais
-
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Cybersecurity Blueprint for Executives
- A No-Nonsense Guide to What To Do When Attacked, How To Mitigate Risk, and Make Smarter Business Decisions To Enhance Your Leadership Impact
- Auteur(s): Marco Ryan, Andrew Fitzmaurice
- Narrateur(s): James Moors
- Durée: 9 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
"The Cybersecurity Blueprint for Executives" transforms complex cyber challenges into clear, actionable strategies for business leaders. Authors Marco Ryan and Andrew Fitzmaurice draw upon their expertise across government, academia, and business to provide answers you need.
-
The Cybersecurity Blueprint for Executives
- A No-Nonsense Guide to What To Do When Attacked, How To Mitigate Risk, and Make Smarter Business Decisions To Enhance Your Leadership Impact
- Narrateur(s): James Moors
- Durée: 9 h et 8 min
- Date de publication: 2024-11-11
- Langue: Anglais
-
"The Cybersecurity Blueprint for Executives" transforms complex cyber challenges into clear, actionable strategies for business leaders. Authors Marco Ryan and Andrew Fitzmaurice draw upon their expertise across government, academia, and business to provide answers you need.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Mastering OSINT and Dark Web Investigations
- Techniques for the Modern Investigator
- Auteur(s): Eric Waldrep
- Narrateur(s): Dave LaCosse
- Durée: 5 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Mastering OSINT and Dark Web Investigations: by Eric Waldrep is an advanced guide for professionals navigating the complex worlds of Open Source Intelligence (OSINT) and the Dark Web. The book equips investigators with technical skills, methodologies, and ethical frameworks to handle cases ranging from corporate fraud to national security threats.
-
Mastering OSINT and Dark Web Investigations
- Techniques for the Modern Investigator
- Narrateur(s): Dave LaCosse
- Durée: 5 h et 6 min
- Date de publication: 2025-03-03
- Langue: Anglais
-
Mastering OSINT and Dark Web Investigations: by Eric Waldrep is an advanced guide for professionals navigating the complex worlds of Open Source Intelligence (OSINT) and the Dark Web.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Field Manual for Cyber Incident Handling and Response
- Prevent. Respond. Recover: A Tactical Guide to Leading Through Cyber Incidents
- Auteur(s): Austin Weedor, Jacob Ideji
- Narrateur(s): Nene Nwoko
- Durée: 5 h et 7 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Cybersecurity incidents aren't just technical events — they are high-stakes leadership challenges. From ransomware attacks that paralyze city governments to data breaches that cripple global enterprises, leaders today must be prepared to act decisively when every second counts. Field Manual for Cyber Incident Handling and Response is a hands-on, executive-ready guide designed to help organizations respond to cyber crises with clarity, precision, and confidence.
-
Field Manual for Cyber Incident Handling and Response
- Prevent. Respond. Recover: A Tactical Guide to Leading Through Cyber Incidents
- Narrateur(s): Nene Nwoko
- Durée: 5 h et 7 min
- Date de publication: 2026-01-09
- Langue: Anglais
-
Cybersecurity incidents aren't just technical events — they are high-stakes leadership challenges. From ransomware attacks that paralyze city governments to data breaches that cripple global enterprises, leaders today must be prepared to act decisively when every second counts.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- Auteur(s): Roger A. Grimes
- Narrateur(s): Jonathan Todd Ross
- Durée: 10 h et 46 min
- Version intégrale
-
Au global1
-
Performance0
-
Histoire0
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- Narrateur(s): Jonathan Todd Ross
- Durée: 10 h et 46 min
- Date de publication: 2019-10-08
- Langue: Anglais
-
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 31 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills. With a blend of theoretical knowledge and practical applications, this book serves as a valuable resource for anyone looking to navigate the complexities of Linux effectively.
-
CompTIA Linux+ (Plus) Certification: The Ultimate Study Guide to Ace the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 31 min
- Date de publication: 2024-02-09
- Langue: Anglais
-
In the dynamic landscape of technology, familiarity with Linux has become increasingly indispensable. Our book offers a comprehensive exploration of the Linux operating system, tailored for both beginners and seasoned users seeking to deepen their understanding and refine their skills.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Fundamentals
- Governance Risk & Compliance (GRC) (Cybersecurity Beginner, Book 2)
- Auteur(s): Bruce Brown
- Narrateur(s): Kevin Howard
- Durée: 3 h et 16 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Discover the Secrets of Cybersecurity Governance, Risk, and Compliance with Cybersecurity Fundamentals: Governance, Risk & Compliance by Bruce Brown, CISSP, CGRC. In the ever-evolving world of cybersecurity, understanding the intricacies of Governance, Risk, and Compliance (GRC) is not just beneficial—it's essential. Despite being one of the most crucial areas in cybersecurity, GRC is often overlooked, leaving many professionals unprepared for the challenges ahead. This book changes that narrative.
-
Cybersecurity Fundamentals
- Governance Risk & Compliance (GRC) (Cybersecurity Beginner, Book 2)
- Narrateur(s): Kevin Howard
- Série: Cybersecurity Beginner, Livre 2
- Durée: 3 h et 16 min
- Date de publication: 2024-10-03
- Langue: Anglais
-
Discover the Secrets of Cybersecurity Governance, Risk, and Compliance with Cybersecurity Fundamentals: Governance, Risk & Compliance by Bruce Brown, CISSP, CGRC.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Auteur(s): Anthony Hack
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you. This audiobook includes: SQL Computer Programming for Beginners, Python for Beginners, Kali Linux and Hacking with Kali Linux.
-
Programming for Beginners
- This Book Includes: SQL Computer Programming for Beginners, Python, Kali Linux, Hacking with Kali Linux. Learn Coding Languages 2020.
- Narrateur(s): Jordan Gunner, Robert Plank
- Durée: 15 h et 41 min
- Date de publication: 2020-09-18
- Langue: Anglais
-
Have you always been interested in the world of programming? If you want to learn the programming languages for beginners or the professional hacking techniques, then this is the perfect audiobook for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Date de publication: 2024-03-06
- Langue: Anglais
-
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Auteur(s): Roger A. Grimes
- Narrateur(s): Mike Lenz
- Durée: 13 h et 30 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Narrateur(s): Mike Lenz
- Durée: 13 h et 30 min
- Date de publication: 2025-07-01
- Langue: Anglais
-
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- Auteur(s): Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrateur(s): Rich Boniface
- Durée: 15 h et 8 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- Narrateur(s): Rich Boniface
- Durée: 15 h et 8 min
- Date de publication: 2024-04-26
- Langue: Anglais
-
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,27 $ ou gratuit avec l'essai de 30 jours
-
-
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- Auteur(s): Steven Levy
- Narrateur(s): Rich Miller
- Durée: 14 h et 2 min
- Version intégrale
-
Au global8
-
Performance6
-
Histoire6
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- Narrateur(s): Rich Miller
- Durée: 14 h et 2 min
- Date de publication: 2021-04-27
- Langue: Anglais
-
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that affects every citizen in the 21st century....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- Auteur(s): Rick Howard
- Narrateur(s): Rick Howard
- Durée: 9 h et 15 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- Narrateur(s): Rick Howard
- Durée: 9 h et 15 min
- Date de publication: 2023-08-02
- Langue: Anglais
-
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
30,29 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Developer's Playbook for Large Language Model Security
- Building Secure AI Applications
- Auteur(s): Steve Wilson
- Narrateur(s): Jonathan Yen
- Durée: 8 h et 27 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models.
-
The Developer's Playbook for Large Language Model Security
- Building Secure AI Applications
- Narrateur(s): Jonathan Yen
- Durée: 8 h et 27 min
- Date de publication: 2025-05-13
- Langue: Anglais
-
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Lights Out
- A Cyberattack, A Nation Unprepared, Surviving the Aftermath
- Auteur(s): Ted Koppel
- Narrateur(s): Ted Koppel
- Durée: 8 h et 10 min
- Version intégrale
-
Au global9
-
Performance7
-
Histoire7
NEW YORK TIMES BESTSELLER Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared. “Fascinating, frightening, and beyond timely.”—Anderson Cooper Imagine a...
-
-
Beautifully read... ASTOUNDINGLY RESEARCHED!!!!!
- Écrit par Q le 2019-03-15
-
Lights Out
- A Cyberattack, A Nation Unprepared, Surviving the Aftermath
- Narrateur(s): Ted Koppel
- Durée: 8 h et 10 min
- Date de publication: 2015-10-27
- Langue: Anglais
- NEW YORK TIMES BESTSELLER Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared. “Fascinating, frightening, and beyond timely.”—Anderson Cooper Imagine a...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
Investigating Cryptocurrencies
- Understanding, Extracting, and Analyzing Blockchain Evidence
- Auteur(s): Nick Furneaux
- Narrateur(s): Christopher Grove
- Durée: 10 h et 22 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. Listen to this book to understand blockchain and transaction technologies, set up and run cryptocurrency accounts, identify users of cryptocurrencies, and more.
-
Investigating Cryptocurrencies
- Understanding, Extracting, and Analyzing Blockchain Evidence
- Narrateur(s): Christopher Grove
- Durée: 10 h et 22 min
- Date de publication: 2019-12-03
- Langue: Anglais
-
Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Information Security and Privacy Quick Reference
- The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer
- Auteur(s): Joe Shelley, Mike Chapple, James Michael Stewart
- Narrateur(s): Rick Barr
- Durée: 12 h et 38 min
- Version intégrale
-
Au global0
-
Performance0
-
Histoire0
The Information Security and Privacy Quick Reference: The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer is an updated, convenient, and accurate desk reference for information privacy practitioners who need fast and easy access to the latest guidance, laws, and standards that apply in their field. This book is the most effective resource for information security professionals who need immediate and correct solutions to common and rarely encountered problems.
-
Information Security and Privacy Quick Reference
- The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer
- Narrateur(s): Rick Barr
- Durée: 12 h et 38 min
- Date de publication: 2025-08-26
- Langue: Anglais
-
A fast, accurate, and up-to-date desk reference for information security and privacy practitioners everywhere.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-