Computer Security
-
-
What Stays in Vegas
- The World of Personal Data - Lifeblood of Big Business - and the End of Privacy as We Know It
- Auteur(s): Adam Tanner
- Narrateur(s): John McLain
- Durée: 9 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers, and other firms are voraciously gathering data with little oversight from anyone. In Las Vegas, no company knows the value of data better than Caesars Entertainment. Many thousands of enthusiastic clients pour through the ever-open doors of their casinos. The secret to the company’s success lies in their one unrivaled asset: they know their clients intimately by tracking the activities of the overwhelming majority of gamblers.
-
What Stays in Vegas
- The World of Personal Data - Lifeblood of Big Business - and the End of Privacy as We Know It
- Narrateur(s): John McLain
- Durée: 9 h et 9 min
- Date de publication: 2014-09-02
- Langue: Anglais
- The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers, and other firms are voraciously gathering data with little oversight from anyone....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34$ ou 1 crédit
Prix réduit: 9,34$ ou 1 crédit
-
-
-
Digital Downfall
- Technology, Cyberattacks and the End of the American Republic
- Auteur(s): Hugh Taylor
- Narrateur(s): Robbie Smith
- Durée: 6 h et 45 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is America on the brink of civil war? Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict? What would happen if the lights went out and the technology we rely upon to run American life is no longer available? The present dangers are real. The US is more vulnerable to destructive foreign interference today than it has been in over a century. As Russia and China realize they can’t win shooting wars against the US, they have devised new and cunning ways to destabilize American politics and cripple the US economy.
-
Digital Downfall
- Technology, Cyberattacks and the End of the American Republic
- Narrateur(s): Robbie Smith
- Durée: 6 h et 45 min
- Date de publication: 2020-08-20
- Langue: Anglais
-
Is America on the brink of civil war? Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict? What would happen if the lights went out and the technology we rely upon to run American life is no longer available? The present dangers are real....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Hacked Again
- Auteur(s): Scott N. Schober
- Narrateur(s): John Pruden
- Durée: 3 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
-
Hacked Again
- Narrateur(s): John Pruden
- Durée: 3 h et 38 min
- Date de publication: 2016-02-18
- Langue: Anglais
- Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,10$ ou 1 crédit
Prix réduit: 20,10$ ou 1 crédit
-
-
-
Parenting for the Digital Age
- The Truth behind Media's Effect on Children and What to Do about It
- Auteur(s): Bill Ratner
- Narrateur(s): Bill Ratner
- Durée: 4 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
From how to deal with cyberbullying to the strange, true stories behind Barbie and G.I. Joe, media insider Bill Ratner takes an inside look at our wired-up world in a fascinating book - part memoir, part parenting guide - for the digital age. Landing his first job in advertising at age fourteen, Ratner learned early that the media doesn't necessarily have our best interests at heart.
-
Parenting for the Digital Age
- The Truth behind Media's Effect on Children and What to Do about It
- Narrateur(s): Bill Ratner
- Durée: 4 h et 47 min
- Date de publication: 2014-12-09
- Langue: Anglais
- From how to deal with cyberbullying to the strange, true stories behind Barbie and G.I. Joe, media insider Bill Ratner takes an inside look at our wired-up world in a fascinating book....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- Auteur(s): L.D. Knowings
- Narrateur(s): Barry Fike
- Durée: 3 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively. Did you know that over 60% of businesses have experienced a cybersecurity incident in the past year? In a world where digital threats are escalating, understanding and mastering penetration testing is no longer a choice but a necessity.
-
Penetration Testing Demystified: A Hands-on Introduction and Practical Guide
- Your Keys to Security Tools and Techniques
- Narrateur(s): Barry Fike
- Durée: 3 h et 39 min
- Date de publication: 2024-05-06
- Langue: Anglais
-
It's time to address the elephant in the room: overlooked cybersecurity weak points. This guide not only identifies these vulnerabilities but also arms you with the tools and tactics to fortify your digital defenses effectively.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- Auteur(s): Josephine Wolff
- Narrateur(s): Kate Reading
- Durée: 14 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity incidents make the news with startling regularity. Each breach makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- Narrateur(s): Kate Reading
- Durée: 14 h
- Date de publication: 2018-11-13
- Langue: Anglais
-
Cybersecurity incidents make the news with startling regularity. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 23,18$ ou 1 crédit
Prix réduit: 23,18$ ou 1 crédit
-
-
-
Building a Career in Cybersecurity
- The Strategy and Skills You Need to Succeed
- Auteur(s): Yuri Diogenes
- Narrateur(s): Michael F. Walworth
- Durée: 4 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity is one of the world’s fastest growing, most exciting fields—but that doesn’t mean it’s easy to enter the industry and succeed. Now there’s a complete guide to creating a great cybersecurity career, whether you’re migrating to cybersecurity from another field or already a cybersecurity professional.
-
Building a Career in Cybersecurity
- The Strategy and Skills You Need to Succeed
- Narrateur(s): Michael F. Walworth
- Durée: 4 h et 15 min
- Date de publication: 2023-11-16
- Langue: Anglais
-
Cybersecurity is one of the world’s fastest growing, most exciting fields—but that doesn’t mean it’s easy to enter the industry and succeed....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cybersecurity
- The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
- Auteur(s): Trust Genics
- Narrateur(s): Leon Tietz
- Durée: 3 h et 48 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk. At an individual level, a cybersecurity attack can result in everything from identity theft to extortion attempts, to the loss of important data like family photos. However, there are simple things you can do to protect yourself, your family, and your work.
-
Cybersecurity
- The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
- Narrateur(s): Leon Tietz
- Durée: 3 h et 48 min
- Date de publication: 2020-03-07
- Langue: Anglais
-
Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,08$ ou 1 crédit
Prix réduit: 9,08$ ou 1 crédit
-
-
-
#Hacked
- 10 Practical Cybersecurity Tips to Help Protect Personal or Business Information
- Auteur(s): Albert Whale
- Narrateur(s): Dana Lara Meecham
- Durée: 2 h et 54 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The #HACKED book (2024 edition) is the perfect resource for anyone looking to learn about cybersecurity. Written by leading experts in the field, this book provides in-depth coverage of all aspects of cybersecurity. Whether you're a business owner, student, or just someone who wants to stay safe online, The #HACKED book has everything you need to know.
-
#Hacked
- 10 Practical Cybersecurity Tips to Help Protect Personal or Business Information
- Narrateur(s): Dana Lara Meecham
- Durée: 2 h et 54 min
- Date de publication: 2024-04-17
- Langue: Anglais
-
The #HACKED book (2024 edition) is the perfect resource for anyone looking to learn about cybersecurity. Written by leading experts in the field, this book provides in-depth coverage of all aspects of cybersecurity.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- Auteur(s): Scott N. Schober, Craig W. Schober
- Narrateur(s): Stephen Bowlby
- Durée: 7 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now, joined by his brother Craig, the two have set their sights on the biggest target of all: small businesses. Throughout Cybersecurity Is Everybody's Business, Scott and Craig contextualize the impact of these cyber attacks on your small business and daily lives to provide expert insight and a plan of attack for fending off future security breaches.
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- Narrateur(s): Stephen Bowlby
- Durée: 7 h et 15 min
- Date de publication: 2019-10-22
- Langue: Anglais
-
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
いまさら聞けないWeb3、NFT、メタバースについて増田雅史先生に聞いてみた
- Série: 〇〇先生に聞いてみたシリーズ, Livre 増田 雅史 先生
- Durée: 5 h et 26 min
- Date de publication: 2025-05-30
- Langue: Japonais
- 驚異的な勢いでビジネス化が進む「メタバース」や「NFT」、今後注目される「DAO」「Web3」について、イラストでわかりやすく解説。誰もが抱くシンプルな疑問をひとつずつ解決します。
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 32,73$ ou 1 crédit
Prix réduit: 32,73$ ou 1 crédit
-
-
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Auteur(s): Department of Justice FBI NSA Department of State
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Date de publication: 2023-06-21
- Langue: Anglais
-
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity Jobs Resume Marketing
- Find Cybersecurity Jobs, Book 1
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 2 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
According to the White House, there are 700,000 cybersecurity positions open today. Using the techniques in this audiobook, you can be a part of one of the fastest, highest salary career paths in IT.
-
Cybersecurity Jobs Resume Marketing
- Find Cybersecurity Jobs, Book 1
- Narrateur(s): Frank Block
- Série: Find Cybersecurity Jobs, Livre 1
- Durée: 2 h et 23 min
- Date de publication: 2022-11-11
- Langue: Anglais
-
According to the White House, there are 700,000 cybersecurity positions open today. Using the techniques in this audiobook, you can be a part of one of the fastest, highest salary career paths in IT....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide
- NIST 800 Cybersecurity, Book 3
- Auteur(s): Bruce Brown
- Narrateur(s): Layne Ihde
- Durée: 3 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Whether you're a seasoned professional looking to expand your knowledge or a newcomer seeking to kickstart your cybersecurity career, RMF Security Control Assessor by Bruce Brown, CISSP, is the ultimate guide to mastering the art of cybersecurity assessments.
-
RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide
- NIST 800 Cybersecurity, Book 3
- Narrateur(s): Layne Ihde
- Série: NIST 800 Cybersecurity, Livre 3
- Durée: 3 h et 44 min
- Date de publication: 2023-05-10
- Langue: Anglais
-
Whether you're a seasoned professional looking to expand your knowledge or a newcomer seeking to kickstart your cybersecurity career, RMF Security Control Assessor by Bruce Brown, CISSP, is the ultimate guide to mastering the art of cybersecurity assessments....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Auteur(s): Niels Starling
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security. We all think our information is at risk when actually hiding it away runs the greatest risk.
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Date de publication: 2020-12-16
- Langue: Anglais
-
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cyber Security
- Learn the Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies
- Auteur(s): Noah Zhang, Dana Onyshko
- Narrateur(s): Gary Westphalen
- Durée: 3 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Companies that can use technology wisely and well are booming, and companies that make bad or no technology choices collapse and disappear. The cloud, smart devices, and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. The bad actors are in on this, too, and it creates a real problem right now for every individual and business.
-
Cyber Security
- Learn the Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies
- Narrateur(s): Gary Westphalen
- Durée: 3 h et 42 min
- Date de publication: 2020-10-13
- Langue: Anglais
-
Companies that can use technology wisely and well are booming, and companies that make bad or no technology choices collapse and disappear. The cloud, smart devices, and the ability to connect almost any object to the internet are an essential landscape to use....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cyber Security
- How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond
- Auteur(s): Matt Reyes
- Narrateur(s): Duke Holm
- Durée: 3 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber attacks are a growing problem that’s affecting an increasing number of devices and people. The current numbers are staggering. Hackers create and deploy over 300,000 new malware programs every single day on networks, individual computers, and other devices. And there are nearly half a million ransomware attacks every year.
-
Cyber Security
- How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond
- Narrateur(s): Duke Holm
- Durée: 3 h et 12 min
- Date de publication: 2019-11-14
- Langue: Anglais
-
Cyber attacks are a growing problem that’s affecting an increasing number of devices and people. The current numbers are staggering. Hackers create and deploy over 300,000 new malware programs every single day on networks, individual computers, and other devices....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 15,10$ ou 1 crédit
Prix réduit: 15,10$ ou 1 crédit
-
-
-
The Hidden Corporation
- A Data Management Security Novel
- Auteur(s): David Schlesinger
- Narrateur(s): Bobby Hundley
- Durée: 5 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss.
-
The Hidden Corporation
- A Data Management Security Novel
- Narrateur(s): Bobby Hundley
- Durée: 5 h et 38 min
- Date de publication: 2016-09-29
- Langue: Anglais
- Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,40$ ou 1 crédit
Prix réduit: 26,40$ ou 1 crédit
-
-
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet. A global, multistakeholder community made up of many organizations shapes internet policy, operations, and security. But the ongoing and increasing reliance on the internet underscores the need to understand the risks to its underlying architecture.
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Phone Phishing (Vishing) for Seniors
- Cyber Safety in 15 Minutes a Day for Seniors (Cyber Safety in 15-Min a Day for Seniors, Book 1)
- Auteur(s): Dr. Feliks Kravets
- Narrateur(s): Barry Fike
- Durée: 1 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book is part of a series titled "CyberSafety in 15 Minutes a Day," aimed specifically at enhancing the awareness of social engineering threats among seniors. Given that seniors are often the primary targets of cyber attacks, the goal of this publication is to support the community by offering cyber safety coaching and enhancing awareness about social engineering tactics.
-
Phone Phishing (Vishing) for Seniors
- Cyber Safety in 15 Minutes a Day for Seniors (Cyber Safety in 15-Min a Day for Seniors, Book 1)
- Narrateur(s): Barry Fike
- Série: Cyber Safety in 15 Minutes a Day for Seniors, Livre 1
- Durée: 1 h et 5 min
- Date de publication: 2024-04-25
- Langue: Anglais
-
This book is part of a series titled "CyberSafety in 15 Minutes a Day," aimed specifically at enhancing the awareness of social engineering threats among seniors.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-