Computer Security
-
-
Tips For: Quantum-Readiness
- Migration to Post-Quantum Cryptography
- Auteur(s): Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), National Institute of Standards and Technology (NIST)
- Narrateur(s): Tom Brooks
- Durée: 1 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the National Institute of Standards and Technology (NIST) created this factsheet to inform organizations—especially those that support critical infrastructure—about the impacts of quantum capabilities and to encourage the early planning for migration to post-quantum cryptographic standards by developing a quantum-readiness road map.
-
Tips For: Quantum-Readiness
- Migration to Post-Quantum Cryptography
- Narrateur(s): Tom Brooks
- Durée: 1 h et 36 min
- Date de publication: 2023-09-08
- Langue: Anglais
-
The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the National Institute of Standards and Technology (NIST) created this factsheet to inform organizations—especially those that support critical infrastructure, about quantum capabilities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Practical Cloud Security
- A Guide for Secure Design and Deployment (2nd Edition)
- Auteur(s): Chris Dotson
- Narrateur(s): Stephen Caffrey
- Durée: 11 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.
-
Practical Cloud Security
- A Guide for Secure Design and Deployment (2nd Edition)
- Narrateur(s): Stephen Caffrey
- Durée: 11 h et 18 min
- Date de publication: 2024-09-24
- Langue: Anglais
-
In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Inside Cyber
- How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security
- Auteur(s): Chuck Brooks
- Narrateur(s): Ray Greenley
- Durée: 6 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security emerges as a critical roadmap for understanding and leveraging the next wave of tech advancements. Chuck Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.
-
Inside Cyber
- How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security
- Narrateur(s): Ray Greenley
- Durée: 6 h et 27 min
- Date de publication: 2024-10-29
- Langue: Anglais
-
Chuck Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
Cryptography
- Auteur(s): Panos Louridas
- Narrateur(s): Tom Beyer
- Durée: 6 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets.
-
Cryptography
- Narrateur(s): Tom Beyer
- Durée: 6 h et 30 min
- Date de publication: 2024-10-22
- Langue: Anglais
-
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
CISA Cybersecurity Strategic Plan FY2024-2026
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Malicious cyber actors recognize our dependence on technology and constantly attempt to exploit this reliance for financial or strategic gain. Too often, they succeed. Their success is enabled by an environment of insecurity, in which our enterprises are too difficult to defend, and our technology products are too vulnerable to protect.
-
CISA Cybersecurity Strategic Plan FY2024-2026
- Narrateur(s): Tom Brooks
- Durée: 2 h et 37 min
- Date de publication: 2023-09-28
- Langue: Anglais
-
Malicious cyber actors recognize our dependence on technology and constantly attempt to exploit this reliance for financial or strategic gain. Too often, they succeed....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Power to the People
- How Open Technological Innovation is Arming Tomorrow's Terrorists
- Auteur(s): Audrey Kurth Cronin
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As Audrey Kurth Cronin explains in Power to the People, what we are seeing now is an exacerbation of an age-old trend. Over the centuries, the most surprising developments in warfare have occurred because of advances in technologies combined with changes in who can use them. Indeed, accessible innovations in destructive force have long driven new patterns of political violence. When Nobel invented dynamite and Kalashnikov designed the AK-47, each inadvertently spurred terrorist and insurgent movements that killed millions and upended the international system.
-
Power to the People
- How Open Technological Innovation is Arming Tomorrow's Terrorists
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 40 min
- Date de publication: 2020-03-10
- Langue: Anglais
-
Never have so many possessed the means to be so lethal. The diffusion of modern technology to ordinary people has given them access to weapons of mass violence previously monopolized by the state....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Becoming an Ethical Hacker
- Masters at Work
- Auteur(s): Gary Rivlin
- Narrateur(s): Michael David Axtell
- Durée: 3 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
An acclaimed investigative journalist explores ethical hacking and presents a listener-friendly, informative guide to everything there is to know about entering the field of cybersecurity.
-
Becoming an Ethical Hacker
- Masters at Work
- Narrateur(s): Michael David Axtell
- Série: Masters at Work, Livre 8
- Durée: 3 h et 47 min
- Date de publication: 2019-05-07
- Langue: Anglais
-
An acclaimed investigative journalist explores ethical hacking and presents a listener-friendly, informative guide to everything there is to know about entering the field of cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 14,56$ ou 1 crédit
Prix réduit: 14,56$ ou 1 crédit
-
-
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Auteur(s): L.D. Knowings
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover everything you need to know about hacking. Step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one download! You need to get it now to know what's inside, as it can't be shared here!
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Date de publication: 2015-12-21
- Langue: Anglais
- Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34$ ou 1 crédit
Prix réduit: 9,34$ ou 1 crédit
-
-
-
The Battle for Your Computer
- Israel and the Growth of the Global Cyber-Security Industry
- Auteur(s): Alon Arvatz
- Narrateur(s): Mitch Crawford
- Durée: 12 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry, Israeli Defense Force (IDF) cyberwarfare veteran and tech product leader Alon Arvatz examines the "why" and the "how" of the extraordinarily strong connection between Israel's elite cyber military unit and that country's booming offensive and defensive cybersecurity industry. In the book, you'll explore the central role played by Israel in the global fight for cybersecurity supremacy.
-
The Battle for Your Computer
- Israel and the Growth of the Global Cyber-Security Industry
- Narrateur(s): Mitch Crawford
- Durée: 12 h et 32 min
- Date de publication: 2023-10-17
- Langue: Anglais
-
Israeli Defense Force (IDF) cyberwarfare veteran and tech product leader Alon Arvatz examines the "why" and the "how" of the extraordinarily strong connection between Israel's elite cyber military unit and that country's booming offensive and defensive cybersecurity industry....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Internet Security
- Online Protection from Computer Hacking
- Auteur(s): James Cloud
- Narrateur(s): Graham King
- Durée: 1 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you being robbed in your own home and don't even know it? Are you being conned out of your own passwords and account numbers without your knowledge? Are your children safe from predicators when you allow them to be on the computer unsupervised? Do you know how to protect yourself? So what the heck are digital footprints and cookies? Or spam, malware, and phishing? This is a basic guide for the average computer user on how to protect themselves online.
-
Internet Security
- Online Protection from Computer Hacking
- Narrateur(s): Graham King
- Durée: 1 h et 38 min
- Date de publication: 2016-12-23
- Langue: Anglais
- This is a basic guide for the average computer user on how to protect themselves online....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
NIST Cybersecurity & Privacy Program
- Auteur(s): National Institute of Standards and Technology (NIST)
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public. Our work ranges from specific information that can be put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.
-
NIST Cybersecurity & Privacy Program
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Date de publication: 2021-07-19
- Langue: Anglais
-
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process.
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Date de publication: 2023-10-10
- Langue: Anglais
-
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Computer Science 2.0 Beginners Crash Course
- Python, Javascript, Cyber Security, and Algorithms
- Auteur(s): Ian Batantu
- Narrateur(s): Brynn Fleming
- Durée: 3 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The first time I used a computer, it intrigued me to know how these interfaces work. In this audiobook, you’ll learn the same way I did.
-
Computer Science 2.0 Beginners Crash Course
- Python, Javascript, Cyber Security, and Algorithms
- Narrateur(s): Brynn Fleming
- Durée: 3 h et 18 min
- Date de publication: 2023-02-07
- Langue: Anglais
-
The first time I used a computer, it intrigued me to know how these interfaces work. In this audiobook, you’ll learn the same way I did....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Critical Infrastructure Protection:
- Agencies Need to Assess Adoption of Cybersecurity Guidance - February 2022
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 3 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Federal agencies with a lead role to assist and protect one or more of the nation’s 16 critical infrastructures are referred to as sector risk management agencies (SRMAs). The SRMAs for three of the 16 have determined the extent of their sector’s adoption of the National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity (framework). In doing so, lead agencies took actions such as developing sector surveys and conducting technical assessments mapped to framework elements.
-
Critical Infrastructure Protection:
- Agencies Need to Assess Adoption of Cybersecurity Guidance - February 2022
- Narrateur(s): Tom Brooks
- Durée: 3 h et 6 min
- Date de publication: 2022-03-04
- Langue: Anglais
-
Federal agencies with a lead role to assist and protect one or more of the nation’s 16 critical infrastructures are referred to as sector risk management agencies (SRMAs)....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Auteur(s): Cybersecurity Bookstore
- Narrateur(s): Will Davidson
- Durée: 2 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security. The book is divided into eight chapters that cover various aspects of IT security and provide practical guidance on how to secure your organization's data and systems.
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Narrateur(s): Will Davidson
- Durée: 2 h
- Date de publication: 2023-10-24
- Langue: Anglais
-
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- Auteur(s): Dana Onyshko
- Narrateur(s): Gary Westphalen, Jon Bratton
- Durée: 5 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management. Do you feel that cyber security is indispensable in todays digital-dependent world? Do you want to introduce yourself to the world of cyber security but are easily overwhelmed or not sure where to start? Are you concerned about your own digital devices and networks, do you suspect they may be hacked or reporting information about your daily habits to unknown databases?
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- Narrateur(s): Gary Westphalen, Jon Bratton
- Durée: 5 h et 40 min
- Date de publication: 2024-04-19
- Langue: Anglais
-
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Mastering Online CTFs
- Your Guide to Becoming a Competitor
- Auteur(s): Charles Montago
- Narrateur(s): Matthew Michael Lewis
- Durée: 2 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Imagine yourself on a digital battlefield, armed only with your wits and a keyboard. The thrill of outsmarting hackers and navigating complex cybersecurity challenges fuels your adrenaline, pushing you to new heights of knowledge and skill. As you delve deeper into the world of cybersecurity, you’ll discover the immense potential for growth and mastery that awaits you. With each challenge you conquer, you unlock a new level of expertise, honing your abilities to become a formidable force in the digital realm.
-
Mastering Online CTFs
- Your Guide to Becoming a Competitor
- Narrateur(s): Matthew Michael Lewis
- Durée: 2 h et 19 min
- Date de publication: 2024-09-16
- Langue: Anglais
-
Imagine yourself on a digital battlefield, armed only with your wits and a keyboard. The thrill of outsmarting hackers and navigating complex cybersecurity challenges fuels your adrenaline, pushing you to new heights of knowledge and skill.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Auteur(s): David Senecal
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves. The author uses plain language to lift the veil on bots and fraud, making a topic critical to your website's security easy to understand and even easier to implement.
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Date de publication: 2024-08-27
- Langue: Anglais
-
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Jump-Start Your SOC Analyst Career
- A Roadmap to Cybersecurity Success
- Auteur(s): Tyler Wall, Jarrett Rodrick
- Narrateur(s): Stu Summers
- Durée: 4 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book. Authors Tyler E. Wall and Jarrett W. Rodrick carefully and expertly share real-world insights and practical tips in Jump-start Your SOC Analyst Career. The lessons revealed equip you for interview preparation, tackling day one on the job, and setting long-term development goals.
-
Jump-Start Your SOC Analyst Career
- A Roadmap to Cybersecurity Success
- Narrateur(s): Stu Summers
- Durée: 4 h et 59 min
- Date de publication: 2024-08-07
- Langue: Anglais
-
A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-