Computer Security
-
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Auteur(s): Kelly Shortridge, Aaron Rinehart - contributor
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
-
-
Great content but horribly annoying computer voice
- Écrit par Utilisateur anonyme le 2024-04-08
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Date de publication: 2023-11-28
- Langue: Anglais
-
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 33,40$ ou 1 crédit
Prix réduit: 33,40$ ou 1 crédit
-
-
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Auteur(s): Andy Greenberg
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.
-
This Machine Kills Secrets
- How Wikileakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 47 min
- Date de publication: 2012-09-17
- Langue: Anglais
- The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,04$ ou 1 crédit
Prix réduit: 37,04$ ou 1 crédit
-
-
-
To Save Everything, Click Here
- The Folly of Technological Solutionism
- Auteur(s): Evgeny Morozov
- Narrateur(s): Stephen Hoye
- Durée: 15 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In the very near future, smart “technologies and big data” will allow us to make large-scale and sophisticated interventions in politics, culture, and everyday life. Technology will allow us to solve problems in highly original ways and create new incentives to get more people to do the right thing. But how will such “solutionism” affect our society, once deeply political, moral, and irresolvable dilemmas are recast as uncontroversial and easily manageable matters of technological efficiency?
-
-
I will not think about solutions as I had before
- Écrit par Wendy le 2019-05-19
-
To Save Everything, Click Here
- The Folly of Technological Solutionism
- Narrateur(s): Stephen Hoye
- Durée: 15 h et 59 min
- Date de publication: 2013-12-17
- Langue: Anglais
- In the very near future, smart technologies and big data will allow us to make large-scale and sophisticated interventions in politics, culture, and everyday life....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 40,25$ ou 1 crédit
Prix réduit: 40,25$ ou 1 crédit
-
-
-
CompTIA CASP+ Certification
- The Ultimate Study Guide to Master the Advanced Security Practitioner Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Unravel the intricate layers of modern cybersecurity with the comprehensive guide to the CompTIA CASP+ Certification Advanced Security Practitioner. Dive into the depths of this dynamic field as this book becomes your companion in mastering the multifaceted world of digital defense. This guide will equip both novice and seasoned professionals with the arsenal needed to fortify their expertise. Each chapter serves as a gateway into a domain crucial for fortifying networks, mitigating risks, and mastering advanced security practices.
-
CompTIA CASP+ Certification
- The Ultimate Study Guide to Master the Advanced Security Practitioner Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 17 min
- Date de publication: 2024-01-10
- Langue: Anglais
-
Unravel the intricate layers of modern cybersecurity with the comprehensive guide to the CompTIA CASP+ Certification Advanced Security Practitioner. Dive into the depths of this dynamic field as this book becomes your companion in mastering the multifaceted world of digital defense....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
On Privacy and Technology
- Auteur(s): Daniel J. Solove
- Narrateur(s): Jonathan Todd Ross
- Durée: 4 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Internationally renowned privacy expert Daniel J. Solove draws from a range of fields, from law to philosophy to the humanities, to illustrate the profound changes technology is wreaking upon our privacy, why they matter, and what can be done about them. Solove provides incisive examinations of key concepts in the digital sphere, including control, manipulation, harm, automation, reputation, consent, prediction, inference, and many others.
-
On Privacy and Technology
- Narrateur(s): Jonathan Todd Ross
- Durée: 4 h et 30 min
- Date de publication: 2025-03-25
- Langue: Anglais
-
Succinct and eloquent, On Privacy and Technology is an essential primer on how to face the threats to privacy in today's age of digital technologies and AI.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,00$ ou 1 crédit
Prix réduit: 21,00$ ou 1 crédit
-
-
-
Best Practices for Securing Your Home Network
- Cybersecurity Information February 2023
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Don't be a victim! Malicious cyber actors may leverage your home network to gain access to personal, private, and confidential information. Help protect yourself, your family, and your work by practicing cybersecurity-aware behaviors, observing some basic configuration guidelines, and implementing the following mitigations on your home network.
-
Best Practices for Securing Your Home Network
- Cybersecurity Information February 2023
- Narrateur(s): Tom Brooks
- Durée: 1 h et 33 min
- Date de publication: 2023-04-18
- Langue: Anglais
-
Don't be a victim! Malicious cyber actors may leverage your home network to gain access to personal, private, and confidential information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Real-World Cryptography
- Auteur(s): David Wong
- Narrateur(s): Derek Dysart
- Durée: 13 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging. This audiobook is a joy to listen to - and it might just save your bacon the next time you’re targeted by an adversary after your data.
-
Real-World Cryptography
- Narrateur(s): Derek Dysart
- Durée: 13 h et 49 min
- Date de publication: 2021-12-08
- Langue: Anglais
-
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. You’ll learn building blocks like hash functions and signatures, and cryptographic protocols like HTTPS and secure messaging....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
Mastering Cloud Architecture
- Strategies and Best Practices for Scalability, Cost Savings, and Security: Cloud-Based Infrastructure for High Availability, Performance, and Cost Optimization
- Auteur(s): Bruno Dossantos
- Narrateur(s): Brian Morrow
- Durée: 2 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cloud computing has transformed the way we think about technology infrastructure and application deployment. The benefits of cloud computing, such as scalability, cost savings, and flexibility, have made it a popular choice for organizations of all sizes. This book aims to provide an in-depth understanding of cloud computing architecture, covering the core concepts, principles, and best practices. It will help you gain a comprehensive understanding of cloud computing, from the basics of virtualization to advanced topics such as cloud-native architecture, AI, and edge computing.
-
Mastering Cloud Architecture
- Strategies and Best Practices for Scalability, Cost Savings, and Security: Cloud-Based Infrastructure for High Availability, Performance, and Cost Optimization
- Narrateur(s): Brian Morrow
- Durée: 2 h et 44 min
- Date de publication: 2023-11-13
- Langue: Anglais
-
Cloud computing has transformed the way we think about technology infrastructure and application deployment. The benefits of cloud computing, such as scalability, cost savings, and flexibility, have made it a popular choice for organizations of all sizes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 11 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application. Equip yourself with a dual weapon against cyber threats – a theoretical understanding and actionable strategies. Whether you're a cybersecurity novice or a seasoned expert, this 2-in-1 bundle is a must-have resource.
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- Narrateur(s): Kim Pepper
- Durée: 11 h et 43 min
- Date de publication: 2023-12-03
- Langue: Anglais
-
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Auteur(s): Steve Watkins
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022.
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Date de publication: 2023-09-06
- Langue: Anglais
-
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
- Auteur(s): National Security Agency, CISA
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to highlight the most common cybersecurity misconfigurations in large organizations, and detail the tactics, techniques, and procedures (TTPs) actors use to exploit these misconfigurations. Through NSA and CISA Red and Blue team assessments, as well as through the activities of NSA and CISA Hunt and Incident Response teams, the agencies identified the following 10 most common network misconfigurations.
-
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Date de publication: 2023-10-19
- Langue: Anglais
-
The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to highlight the most common cybersecurity misconfigurations in large organizations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- Auteur(s): Frank W. Abagnale
- Narrateur(s): Raymond Todd
- Durée: 7 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- Narrateur(s): Raymond Todd
- Durée: 7 h et 16 min
- Date de publication: 2007-04-09
- Langue: Anglais
- Someone in the U.S. is an identity-theft victim every four seconds. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,12$ ou 1 crédit
Prix réduit: 17,12$ ou 1 crédit
-
-
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Date de publication: 2024-05-28
- Langue: Anglais
-
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Auteur(s): Norman Laurence
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Date de publication: 2020-10-21
- Langue: Anglais
-
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Auteur(s): Prabath Siriwardena, Nuwan Dias
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication.
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Date de publication: 2021-03-17
- Langue: Anglais
-
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53$ ou 1 crédit
Prix réduit: 37,53$ ou 1 crédit
-
-
-
Cyber Security - 3 Book Combo
- Cyber Essentials - Cybersecurity for Small Business - Is Cyber Deterrence Possible?
- Auteur(s): Cybersecurity and Infrastructure Security Agency - FTC - US Department of Defense
- Narrateur(s): Tom Brooks
- Durée: 3 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As a leader, you need to drive your organization’s approach to cybersecurity as you would any other hazard (e.g. how you identify risk, reduce vulnerabilities, and plan for contingencies). This requires an investment of time and money, as well as the collective buy-in of your management team. Your investment drives actions and activities, and these build and sustain a culture of cybersecurity.
-
Cyber Security - 3 Book Combo
- Cyber Essentials - Cybersecurity for Small Business - Is Cyber Deterrence Possible?
- Narrateur(s): Tom Brooks
- Durée: 3 h et 16 min
- Date de publication: 2021-07-15
- Langue: Anglais
-
As a leader, you need to drive your organization’s approach to cybersecurity as you would any other hazard (e.g. how you identify risk, reduce vulnerabilities, and plan for contingencies). This requires an investment of time and money and the collective buy-in of your management team....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Auteur(s): Raymond Phillips
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself. I am sure if you are considering this book, you too have a reason, but going through this process, I have learned a few valuable lessons. This book is all about those lessons, so you don't have to learn on the go as I had to. Instead, you can use this book as a guide and just follow the step by step process and see yourself disappear from the big World Wide Web.
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Date de publication: 2016-12-14
- Langue: Anglais
- Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 5,31$ ou 1 crédit
Prix réduit: 5,31$ ou 1 crédit
-
-
-
Cybersecurity for Beginners
- Auteur(s): Raef Meeuwisse
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
Cybersecurity for Beginners
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Date de publication: 2017-09-21
- Langue: Anglais
- This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Zero Trust and Third-Party Risk
- Reduce the Blast Radius
- Auteur(s): Gregory C. Rasner
- Narrateur(s): Mike Lenz
- Durée: 6 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk.
-
Zero Trust and Third-Party Risk
- Reduce the Blast Radius
- Narrateur(s): Mike Lenz
- Durée: 6 h et 49 min
- Date de publication: 2023-11-14
- Langue: Anglais
-
Dramatically lower the cyber risk posed by third-party software and vendors in your organization....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,81$ ou 1 crédit
Prix réduit: 17,81$ ou 1 crédit
-
-
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- Auteur(s): Omar Santos, Petar Radanliev
- Narrateur(s): Max Newland
- Durée: 11 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology. Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview.
-
Beyond the Algorithm
- AI, Security, Privacy, and Ethics
- Narrateur(s): Max Newland
- Durée: 11 h et 35 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
As artificial intelligence becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,27$ ou 1 crédit
Prix réduit: 31,27$ ou 1 crédit
-