Computer Security
-
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Auteur(s): Gabriella Coleman
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Date de publication: 2017-01-31
- Langue: Anglais
- Anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,82 $ ou 1 crédit
Prix réduit: 22,82 $ ou 1 crédit
-
-
-
Intercept
- The Secret History of Computers and Spies
- Auteur(s): Gordon Corera
- Narrateur(s): Gordon Corera
- Durée: 15 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is the exhilarating secret history of the melding of technology and espionage. Gordon Corera's compelling narrative, rich with historical details and characters, takes us from the Second World War to the internet age, revealing the astonishing extent of cyberespionage carried out today.
-
Intercept
- The Secret History of Computers and Spies
- Narrateur(s): Gordon Corera
- Durée: 15 h et 2 min
- Date de publication: 2021-01-28
- Langue: Anglais
-
The computer was born to spy and now computers are transforming espionage. But who are the spies and who is being spied on in today's interconnected world? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,83 $ ou 1 crédit
Prix réduit: 37,83 $ ou 1 crédit
-
-
-
Zero Trust Architecture
- Networking Technology: Security
- Auteur(s): Cindy Green-Ortiz, Brandon Fowler, David Houck, Autres
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Zero Trust Architecture
- Networking Technology: Security
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Date de publication: 2024-04-11
- Langue: Anglais
-
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,27 $ ou 1 crédit
Prix réduit: 31,27 $ ou 1 crédit
-
-
-
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
- Auteur(s): National Security Agency, CISA
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to highlight the most common cybersecurity misconfigurations in large organizations, and detail the tactics, techniques, and procedures (TTPs) actors use to exploit these misconfigurations. Through NSA and CISA Red and Blue team assessments, as well as through the activities of NSA and CISA Hunt and Incident Response teams, the agencies identified the following 10 most common network misconfigurations.
-
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Date de publication: 2023-10-19
- Langue: Anglais
-
The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to highlight the most common cybersecurity misconfigurations in large organizations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
Amazon Web Services in Action
- Auteur(s): Andreas Wittig, Michael Wittig
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability.
-
Amazon Web Services in Action
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Date de publication: 2018-12-12
- Langue: Anglais
-
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Auteur(s): Zeynep Tufekci
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
An incisive observer, writer, and participant in today's social movements, Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests, and why they have difficulty persisting in their long-term quests for change.
-
-
A must read for those interested in social media
- Écrit par Bijan le 2018-09-13
-
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Date de publication: 2017-05-16
- Langue: Anglais
- Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26 $ ou 1 crédit
Prix réduit: 31,26 $ ou 1 crédit
-
-
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Auteur(s): Clint Watts
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns that have become the cutting edge of modern warfare - and how we can protect ourselves against them. Clint Watts electrified the nation when he testified regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind.
-
-
Interesting and engaging
- Écrit par Mark Dynna le 2018-07-18
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Date de publication: 2018-05-29
- Langue: Anglais
-
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare - and how we can protect ourselves and our country against them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,46 $ ou 1 crédit
Prix réduit: 31,46 $ ou 1 crédit
-
-
-
Cyber Security Program and Policy Using NIST Cybersecurity Framework
- NIST Cybersecurity Framework (CSF), Book 2
- Auteur(s): Bruce Brown, convocourses
- Narrateur(s): Kim Pepper
- Durée: 3 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In today's digital age, safeguarding your organization's assets from cyber threats is paramount. Equip yourself with the knowledge and tools necessary with Cyber Security Program and Policy Using NIST Cybersecurity Framework by seasoned cybersecurity professionals. This guide steers you through the process of creating robust, professional documents and procedures designed to protect your data and digital assets from evolving cyber risks.
-
Cyber Security Program and Policy Using NIST Cybersecurity Framework
- NIST Cybersecurity Framework (CSF), Book 2
- Narrateur(s): Kim Pepper
- Série: NIST Cybersecurity Framework, Livre 2
- Durée: 3 h et 29 min
- Date de publication: 2023-09-25
- Langue: Anglais
-
This guide steers you through the process of creating robust, professional documents and procedures designed to protect your data and digital assets from evolving cyber risks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- Auteur(s): Peter Aiken, Todd Harbour
- Narrateur(s): Susan Hanfield
- Durée: 9 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance. Our Digital Civics Framework presents a guide to increasing the data literacy of billions of citizens. We outline the data knowledge that society needs and propose exercises that will help citizens interact productively within a data-driven society.
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- Narrateur(s): Susan Hanfield
- Durée: 9 h et 43 min
- Date de publication: 2022-05-16
- Langue: Anglais
-
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Cybersecurity Jobs Work from Home
- Find Cybersecurity Jobs, Book 3
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 1 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you have ever wanted to work from home as a cybersecurity professional, then this is the book for you. We get straight to the point of how to do it. I have been working remotely as a cybersecurity professional since 2014.
-
Cybersecurity Jobs Work from Home
- Find Cybersecurity Jobs, Book 3
- Narrateur(s): Frank Block
- Série: Find Cybersecurity Jobs, Livre 3
- Durée: 1 h et 8 min
- Date de publication: 2023-02-03
- Langue: Anglais
-
If you have ever wanted to work from home as a cybersecurity professional, then this is the book for you. We get straight to the point of how to do it. I have been working remotely as a cybersecurity professional since 2014....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $ ou 1 crédit
Prix réduit: 8,71 $ ou 1 crédit
-
-
-
Cloud Security for Dummies
- Auteur(s): Ted Coombs
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security for Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom up.
-
Cloud Security for Dummies
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Date de publication: 2022-03-29
- Langue: Anglais
-
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 38,97 $ ou 1 crédit
Prix réduit: 38,97 $ ou 1 crédit
-
-
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Auteur(s): Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What to Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour—from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria—recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes.
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Narrateur(s): Shawn K. Jain
- Durée: 7 h
- Date de publication: 2023-11-21
- Langue: Anglais
-
A team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92 $ ou 1 crédit
Prix réduit: 21,92 $ ou 1 crédit
-
-
-
Cybersecurity for Beginners
- Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams
- Auteur(s): Michael Patel
- Narrateur(s): Kevin Elliott
- Durée: 5 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With cybersecurity becoming a necessity, Cybersecurity for Beginners offers a clear and actionable guide for safeguarding your personal and professional data. Whether you're preparing for the CompTIA Security+ certification or simply want to understand how to defend against malware and phishing, this book gives you the tools you need to stay safe in the digital world.
-
Cybersecurity for Beginners
- Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams
- Narrateur(s): Kevin Elliott
- Durée: 5 h et 3 min
- Date de publication: 2025-01-13
- Langue: Anglais
-
With cybersecurity becoming a necessity, Cybersecurity for Beginners offers a clear and actionable guide for safeguarding your personal and professional data.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
An Introduction to Information Security and ISO 27001 (2013): A Pocket Guide
- Auteur(s): Steve Watkins
- Narrateur(s): Andy Cresswell
- Durée: 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It is estimated that standard computer-based defense systems catch only 25 percent of malware attacks. Do you know the risks you’re running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. This is a comprehensive guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack.
-
An Introduction to Information Security and ISO 27001 (2013): A Pocket Guide
- Narrateur(s): Andy Cresswell
- Durée: 53 min
- Date de publication: 2018-12-06
- Langue: Anglais
-
An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95 $ ou 1 crédit
Prix réduit: 4,95 $ ou 1 crédit
-
-
-
Hacking: Hacking Firewalls & Bypassing Honeypots
- Auteur(s): Alex Wagner
- Narrateur(s): Jack Bellows
- Durée: 3 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. The main focus of this audiobook is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems, or Honeypots work. Your listening of this audiobook will boost your knowledge on what is possible in today’s hacking world and help you to become an Ethical Hacker aka Penetration Tester.
-
Hacking: Hacking Firewalls & Bypassing Honeypots
- Narrateur(s): Jack Bellows
- Durée: 3 h et 44 min
- Date de publication: 2020-05-22
- Langue: Anglais
-
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 13,52 $ ou 1 crédit
Prix réduit: 13,52 $ ou 1 crédit
-
-
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Auteur(s): L.D. Knowings
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
You're not a tech wizard, and you don't need to be. This book speaks directly to you the concerned netizen, the proactive parent, the small business owner, or the budding entrepreneur. It's designed to break down the complexities of cybersecurity into something you can understand and apply.
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Date de publication: 2024-06-05
- Langue: Anglais
-
Worried about hackers? Fight back with confidence! Discover straightforward steps to safeguard your online presence perfect for non-techies and pros alike.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
Combatting Cyber Terrorism
- A Guide to Understanding the Cyber Threat Landscape and Incident Response Planning
- Auteur(s): Richard Bingley
- Narrateur(s): Daniel Crespin
- Durée: 6 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook recounts case studies to show the types of threats we face and provides a comprehensive coverage of risk management tactics and strategies to protect yourself against such nefarious threat actors. These include key mitigation and controls for information security or security and HR-related professionals.
-
Combatting Cyber Terrorism
- A Guide to Understanding the Cyber Threat Landscape and Incident Response Planning
- Narrateur(s): Daniel Crespin
- Durée: 6 h et 17 min
- Date de publication: 2024-11-04
- Langue: Anglais
-
Combatting Cyber Terrorism – A guide to understanding the cyber threat landscape and incident response planning, analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
How to Build a Cyber-Resilient Organization
- Auteur(s): Dan Shoemaker, Anne Kohnke, Ken Sigler
- Narrateur(s): Kate Harper
- Durée: 16 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book presents a standard methodology approach to cyber-resilience. Listeners will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Listeners will know how to establish a state of systematic cyber-resilience within this structure and how to evolve the protection to correctly address the threat environment.
-
How to Build a Cyber-Resilient Organization
- Narrateur(s): Kate Harper
- Durée: 16 h et 41 min
- Date de publication: 2022-06-23
- Langue: Anglais
-
This book presents a standard methodology approach to cyber-resilience. Listeners will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 48,75 $ ou 1 crédit
Prix réduit: 48,75 $ ou 1 crédit
-
-
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Auteur(s): Jack Jones
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
What do you know about hacking a computer system? If you are like most of us, you can't even get into your own computer if you've forgotten the password. The good news is that hacking is actually a lot easier than you think, and anyone can learn how to do it. As long as you are willing to do the work and to work through the steps patiently, you will also be able to hack the systems that you want to.
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Date de publication: 2017-09-25
- Langue: Anglais
- If you are like most of us, you can't even get into your own computer if you've forgotten the password....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34 $ ou 1 crédit
Prix réduit: 9,34 $ ou 1 crédit
-
-
-
The Internet Police
- How Crime Went Online and the Cops Followed
- Auteur(s): Nate Anderson
- Narrateur(s): James Patrick Cronin
- Durée: 8 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Chaos and order clash in this riveting exploration of crime and punishment on the Internet. Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just computer hackers and cyber crooks who lurk in the dark corners of the Web - the cops are there, too. In The Internet Police, Ars Technica editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed.
-
The Internet Police
- How Crime Went Online and the Cops Followed
- Narrateur(s): James Patrick Cronin
- Durée: 8 h et 37 min
- Date de publication: 2013-11-05
- Langue: Anglais
- Chaos and order clash in this riveting exploration of crime and punishment on the Internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,40 $ ou 1 crédit
Prix réduit: 26,40 $ ou 1 crédit
-