Computer Security
-
-
Zero Trust Architecture
- Networking Technology: Security
- Auteur(s): Cindy Green-Ortiz, Brandon Fowler, David Houck, Autres
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Zero Trust Architecture
- Networking Technology: Security
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Date de publication: 2024-04-11
- Langue: Anglais
-
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,27$ ou 1 crédit
Prix réduit: 31,27$ ou 1 crédit
-
-
-
Black Code
- Surveillance, Privacy, and the Dark Side of the Internet (Expanded Edition)
- Auteur(s): Ronald J. Deibert
- Narrateur(s): Ronald J. Deibert
- Durée: 9 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain. In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what's at stake for Internet users and citizens.
-
Black Code
- Surveillance, Privacy, and the Dark Side of the Internet (Expanded Edition)
- Narrateur(s): Ronald J. Deibert
- Durée: 9 h et 13 min
- Date de publication: 2017-09-04
- Langue: Anglais
- Cyberspace is all around us. We depend on it for everything we do....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,82$ ou 1 crédit
Prix réduit: 26,82$ ou 1 crédit
-
-
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Auteur(s): Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Date de publication: 2024-05-21
- Langue: Anglais
-
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,30$ ou 1 crédit
Prix réduit: 26,30$ ou 1 crédit
-
-
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Auteur(s): Garrett Sutton Esq., Robert T. Kiyosaki - foreword
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Deceptive misinformation comes at us for many reasons. A key one is to steal our assets. We are free to communicate and stay connected in many ways. This great benefit, however, is now abused by criminal elements to take and defraud, bringing shame on trusting souls. The wreckage wrought by cyber criminality is not only financial but highly emotional. Lives are lost to depression and suicide. Don’t let this happen to you or your family. Scam Proof Your Assets: Guarding Against Widespread Deception gives you the tools and context for protecting yourself.
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Date de publication: 2021-05-03
- Langue: Anglais
-
Scam Proof Your Assets gives you the tools and context for protecting yourself. Unlike other sources, Scam Proof Your Assets teaches you the patterns to look for, including greed and fear, "expert" positioning and charm as manipulation....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 28,27$ ou 1 crédit
Prix réduit: 28,27$ ou 1 crédit
-
-
-
The CISO Guide to Zero Trust Security
- Auteur(s): Raj Badhwar
- Narrateur(s): Michelle Badhwar
- Durée: 6 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Zero Trust Security framework provides essential security controls to remediate and mitigate advanced cyber threats from compromising our applications and systems. The leaders of our nation, and the business and technology leaders of our firms, have put in a call to arms for CISOs and other security professionals to lead this effort to secure our systems and applications from cyber-attackers.
-
The CISO Guide to Zero Trust Security
- Narrateur(s): Michelle Badhwar
- Durée: 6 h et 41 min
- Date de publication: 2022-08-12
- Langue: Anglais
-
The Zero Trust Security framework provides essential security controls to remediate and mitigate advanced cyber threats from compromising our applications and systems....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Cloud Security for Dummies
- Auteur(s): Ted Coombs
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security for Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom up.
-
Cloud Security for Dummies
- Narrateur(s): Chris Reilly
- Durée: 16 h et 24 min
- Date de publication: 2022-03-29
- Langue: Anglais
-
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 38,97$ ou 1 crédit
Prix réduit: 38,97$ ou 1 crédit
-
-
-
Viral Parenting
- A Guide to Setting Boundaries, Building Trust, and Raising Responsible Kids in an Online World
- Auteur(s): Mindy McKnight
- Narrateur(s): Mindy McKnight, Shaun McKnight, Brooklyn McKnight, Autres
- Durée: 7 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Viral Parenting is a guide to raising responsible, safe, and communicative kids in the digital world. Mindy shares practical tools for having honest conversations with kids of all ages about privacy, bullying, respectfulness, and family time while emphasizing the importance of trust and open communication. These strategies are timeless - whether applied to texting, snapping, Facebooking, kiking, or whatever social media platforms await us in the future, this book is ultimately about teaching children about personal responsibility and safety.
-
Viral Parenting
- A Guide to Setting Boundaries, Building Trust, and Raising Responsible Kids in an Online World
- Narrateur(s): Mindy McKnight, Shaun McKnight, Brooklyn McKnight, Bailey McKnight
- Durée: 7 h et 28 min
- Date de publication: 2019-04-30
- Langue: Anglais
-
Viral Parenting is a guide to raising responsible, safe, and communicative kids in the digital world. Mindy shares practical tools for having honest conversations with kids of all ages about privacy, bullying, respectfulness, and family time....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,23$ ou 1 crédit
Prix réduit: 25,23$ ou 1 crédit
-
-
-
Crash Override
- How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate
- Auteur(s): Zoë Quinn
- Narrateur(s): Zoë Quinn
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
You've heard the stories about the dark side of the internet—hackers, #gamergate, anonymous mobs attacking an unlucky victim, and revenge porn—but they remain just that: Stories. Surely these things would never happen to you. Zoe Quinn used to feel the same way. She is a video game developer whose ex-boyfriend published a crazed blog post cobbled together from private information, half-truths, and outright fictions, along with a rallying cry to the online hordes to go after her. They answered in the form of a so-called movement known as #gamergate.
-
Crash Override
- How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate
- Narrateur(s): Zoë Quinn
- Durée: 7 h et 9 min
- Date de publication: 2017-09-05
- Langue: Anglais
-
You've heard the stories about the dark side of the internet—hackers, #gamergate, anonymous mobs attacking an unlucky victim, and revenge porn—but they remain just that: Stories. Surely these things would never happen to you. Zoe Quinn used to feel the same way....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 38,31$ ou 1 crédit
Prix réduit: 38,31$ ou 1 crédit
-
-
-
Insider Secrets to Internet Safety
- Advice from a Professional Hacker
- Auteur(s): Terry Cutler
- Narrateur(s): Kaleo Griffith
- Durée: 4 h et 10 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In a world of digital technology, it’s easy to forget one sobering fact: Our identity can be stolen from under our noses, with one click of the mouse, propelling us into nightmares in a matter of minutes, anytime, anywhere, and on any one of our darling gadgets. Cybercrimes, malware, botnets, and all forms of digital threats are ever more sophisticated, waiting in the shadows for that one opportunity to steal your sensitive information.
-
Insider Secrets to Internet Safety
- Advice from a Professional Hacker
- Narrateur(s): Kaleo Griffith
- Durée: 4 h et 10 min
- Date de publication: 2020-07-21
- Langue: Anglais
-
In a world of digital technology, it’s easy to forget one sobering fact: Our identity can be stolen from under our noses, with one click of the mouse, propelling us into nightmares in a matter of minutes, anytime, anywhere, and on any one of our darling gadgets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- Auteur(s): Frank W. Abagnale
- Narrateur(s): Raymond Todd
- Durée: 7 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- Narrateur(s): Raymond Todd
- Durée: 7 h et 16 min
- Date de publication: 2007-04-09
- Langue: Anglais
- Someone in the U.S. is an identity-theft victim every four seconds. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,12$ ou 1 crédit
Prix réduit: 17,12$ ou 1 crédit
-
-
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Auteur(s): Aram Sinnreich, Jesse Gilbert
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Date de publication: 2024-04-30
- Langue: Anglais
-
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
CHFI Computer Hacking Forensic Investigator
- The Ultimate Study Guide to Ace the Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Unlock the world of digital investigation and fortify your expertise in Computer Hacking Forensic Investigation (CHFI) with this comprehensive guide. Tailored specifically for aspirants aiming to ace the CHFI certification, this book is a roadmap to success, blending theory with hands-on practice test questions and detailed answers. Explore the intricate landscape of digital forensics as you navigate through chapters meticulously designed to encompass the core elements of CHFI.
-
CHFI Computer Hacking Forensic Investigator
- The Ultimate Study Guide to Ace the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 7 min
- Date de publication: 2023-12-15
- Langue: Anglais
-
Unlock the world of digital investigation and fortify your expertise in Computer Hacking Forensic Investigation (CHFI) with this comprehensive guide....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- Auteur(s): L.D. Knowings
- Narrateur(s): KC Wayman
- Durée: 3 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets. Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach? We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- Narrateur(s): KC Wayman
- Durée: 3 h et 20 min
- Date de publication: 2024-03-08
- Langue: Anglais
-
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- Auteur(s): George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrateur(s): Lyle Blaker
- Durée: 7 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- Narrateur(s): Lyle Blaker
- Durée: 7 h et 38 min
- Date de publication: 2024-06-25
- Langue: Anglais
-
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 1 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- Narrateur(s): Frank Block
- Série: NIST 800 Cybersecurity, Livre 1
- Durée: 1 h et 32 min
- Date de publication: 2022-06-22
- Langue: Anglais
-
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Hacking: Become the Ultimate Hacker
- Computer Virus Cracking Malware IT Security
- Auteur(s): IT Starter Series, Joseph Connor
- Narrateur(s): Christopher C. Odom
- Durée: 4 h et 48 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Although there are a few hackers out there who are considered to be dangerous, you don’t necessarily have to give up your passion for becoming one. This audiobook focuses more on ethical hacking that will allow you to contribute to an organization of your choice.
-
Hacking: Become the Ultimate Hacker
- Computer Virus Cracking Malware IT Security
- Narrateur(s): Christopher C. Odom
- Durée: 4 h et 48 min
- Date de publication: 2019-02-14
- Langue: Anglais
-
Although there are a few hackers out there who are considered to be dangerous, you don’t necessarily have to give up your passion for becoming one. This audiobook focuses more on ethical hacking that will allow you to contribute to an organization of your choice....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- Auteur(s): Kip Boyle
- Narrateur(s): Kip A. Boyle
- Durée: 5 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- Narrateur(s): Kip A. Boyle
- Durée: 5 h et 14 min
- Date de publication: 2019-09-14
- Langue: Anglais
-
With this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
A Concise Introduction to ISO/IEC 27001:2013
- Auteur(s): ITSM Press
- Narrateur(s): Tom Howery
- Durée: 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a concise introductory guide to the information security management systems (ISMS) standard ISO/IEC 27001:2013....
-
A Concise Introduction to ISO/IEC 27001:2013
- Narrateur(s): Tom Howery
- Durée: 28 min
- Date de publication: 2018-12-19
- Langue: Anglais
-
This is a concise introductory guide to the information security management systems (ISMS) standard ISO/IEC 27001:2013.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
The Social Engineer's Playbook: A Practical Guide to Pretexting
- Auteur(s): Jeremiah Talamantes
- Narrateur(s): Tom Taverna
- Durée: 3 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others. This book covers an introduction to tools, such as: Maltego, Social Engineer Toolkit, Dradis, Metasploit, and Kali Linux among others. Crucial to any social engineering test is the information used to build it. Discover the most valuable sources of intel and how to put them to use.
-
The Social Engineer's Playbook: A Practical Guide to Pretexting
- Narrateur(s): Tom Taverna
- Durée: 3 h
- Date de publication: 2017-11-06
- Langue: Anglais
-
The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- Auteur(s): Taimur Ijlal
- Narrateur(s): Craig Neutzling
- Durée: 1 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- Narrateur(s): Craig Neutzling
- Durée: 1 h et 31 min
- Date de publication: 2023-07-22
- Langue: Anglais
-
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-