Computer Security
-
-
The CISO Guide to Zero Trust Security
- Auteur(s): Raj Badhwar
- Narrateur(s): Michelle Badhwar
- Durée: 6 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Zero Trust Security framework provides essential security controls to remediate and mitigate advanced cyber threats from compromising our applications and systems. The leaders of our nation, and the business and technology leaders of our firms, have put in a call to arms for CISOs and other security professionals to lead this effort to secure our systems and applications from cyber-attackers.
-
The CISO Guide to Zero Trust Security
- Narrateur(s): Michelle Badhwar
- Durée: 6 h et 41 min
- Date de publication: 2022-08-12
- Langue: Anglais
-
The Zero Trust Security framework provides essential security controls to remediate and mitigate advanced cyber threats from compromising our applications and systems....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Auteur(s): Shashi Shekhar, Pamela Vold
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Billions of people around the globe use various applications of spatial computing daily - by using a ride-sharing app, GPS, social media check-ins, even Pokemon Go. Scientists and researchers use spatial computing to track diseases, map the bottom of the oceans, chart the behavior of endangered species, and create election maps in real time. Drones and driverless cars use a variety of spatial computing technologies. Spatial computing works by understanding the physical world, knowing and communicating our relation to places in that world, and navigating through those places.
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Date de publication: 2020-06-02
- Langue: Anglais
-
Billions of people around the globe use various applications of spatial computing daily-by using a ride-sharing app, GPS, the e911 system, social media check-ins, even Pokemon Go....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $ ou 1 crédit
Prix réduit: 22,26 $ ou 1 crédit
-
-
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Auteur(s): Cybersecurity Bookstore
- Narrateur(s): Will Davidson
- Durée: 2 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security. The book is divided into eight chapters that cover various aspects of IT security and provide practical guidance on how to secure your organization's data and systems.
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Narrateur(s): Will Davidson
- Durée: 2 h
- Date de publication: 2023-10-24
- Langue: Anglais
-
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $ ou 1 crédit
Prix réduit: 8,71 $ ou 1 crédit
-
-
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Auteur(s): Garrett Sutton Esq., Robert T. Kiyosaki - foreword
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Deceptive misinformation comes at us for many reasons. A key one is to steal our assets. We are free to communicate and stay connected in many ways. This great benefit, however, is now abused by criminal elements to take and defraud, bringing shame on trusting souls. The wreckage wrought by cyber criminality is not only financial but highly emotional. Lives are lost to depression and suicide. Don’t let this happen to you or your family. Scam Proof Your Assets: Guarding Against Widespread Deception gives you the tools and context for protecting yourself.
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Date de publication: 2021-05-03
- Langue: Anglais
-
Scam Proof Your Assets gives you the tools and context for protecting yourself. Unlike other sources, Scam Proof Your Assets teaches you the patterns to look for, including greed and fear, "expert" positioning and charm as manipulation....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 28,27 $ ou 1 crédit
Prix réduit: 28,27 $ ou 1 crédit
-
-
-
Zero Trust Architecture
- Networking Technology: Security
- Auteur(s): Cindy Green-Ortiz, Brandon Fowler, David Houck, Autres
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Zero Trust Architecture
- Networking Technology: Security
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Date de publication: 2024-04-11
- Langue: Anglais
-
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,27 $ ou 1 crédit
Prix réduit: 31,27 $ ou 1 crédit
-
-
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Auteur(s): Alan T. Norman
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity. The audiobook concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks. Gain the ability to do ethical hacking and penetration testing by taking this hacking audiobook!
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Date de publication: 2019-10-03
- Langue: Anglais
-
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- Auteur(s): Abraham K White
- Narrateur(s): Dalan E Decker
- Durée: 5 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking.
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- Narrateur(s): Dalan E Decker
- Durée: 5 h et 49 min
- Date de publication: 2018-04-26
- Langue: Anglais
-
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Auteur(s): Jeffrey Caruso
- Narrateur(s): Mike Lenz
- Durée: 5 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Narrateur(s): Mike Lenz
- Durée: 5 h et 30 min
- Date de publication: 2025-04-29
- Langue: Anglais
-
Cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 14,02 $ ou 1 crédit
Prix réduit: 14,02 $ ou 1 crédit
-
-
-
Term Life
- A Novel of Love, Death, and Computer Security
- Auteur(s): William H. Boyd
- Narrateur(s): Gregg Rizzo
- Durée: 10 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Gus Bishop lives in a trendy downtown Austin condo. He works in computer security for a high tech Austin tech company and drives a high performance car. Yet, something is missing. Every woman he wants eludes him, and his company is under the threat of being hacked. But after an internet search, Gus meets a strange man who represents a unique insurance company - this company insures its clients, not from death, but from a life that is no longer worth living.
-
Term Life
- A Novel of Love, Death, and Computer Security
- Narrateur(s): Gregg Rizzo
- Durée: 10 h et 50 min
- Date de publication: 2017-11-14
- Langue: Anglais
-
Gus Bishop lives in a trendy downtown Austin condo. He works in computer security for a high tech Austin tech company and drives a high performance car. Yet, something is missing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26 $ ou 1 crédit
Prix réduit: 31,26 $ ou 1 crédit
-
-
-
Cybersecurity for Beginners Made Easy
- Navigate the Digital Maze With Simple Steps, Real-World Solutions, and Expert Insights to Safeguard Your Online Presence
- Auteur(s): Raiden Tekk
- Narrateur(s): Ben Staab
- Durée: 3 h et 56 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Arm yourself with cybersecurity knowledge and skills to stay safe, informed, and empowered in the digital age. Are you concerned about privacy and cyber attacks in an increasingly complex virtual space? Does integrating cybersecurity solutions into your business seem endlessly daunting and complicated? If so, know you can do plenty to identify, mitigate, and avoid cyber risks. And this book will help you get the ball rolling. It features the powerful SECURE IT framework for simplifying even the most complicated concepts.
-
Cybersecurity for Beginners Made Easy
- Navigate the Digital Maze With Simple Steps, Real-World Solutions, and Expert Insights to Safeguard Your Online Presence
- Narrateur(s): Ben Staab
- Durée: 3 h et 56 min
- Date de publication: 2025-01-13
- Langue: Anglais
-
Arm yourself with cybersecurity knowledge and skills to stay safe, informed, and empowered in the digital age.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
Is Cyber Deterrence Possible?
- Auteur(s): US Department of Defense
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In recent years, the importance of operating in and protecting the cyber domain has gained much attention. As long as our nation relies on computer networks as a foundation for military and economic power, our national and economic security are at risk through the cyber domain. Cyber attacks on US industry and government systems severely impact our economy and ability to execute modern, network-centric warfare.
-
Is Cyber Deterrence Possible?
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Date de publication: 2021-04-10
- Langue: Anglais
-
In recent years, the importance of operating in and protecting the cyber domain has gained much attention. As long as our nation relies on computer networks as a foundation for military and economic power, our national and economic security are at risk through the cyber domain....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95 $ ou 1 crédit
Prix réduit: 4,95 $ ou 1 crédit
-
-
-
We Have Root
- Even More Advice from Schneier on Security
- Auteur(s): Bruce Schneier
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments.
-
We Have Root
- Even More Advice from Schneier on Security
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Date de publication: 2019-11-08
- Langue: Anglais
-
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83 $ ou 1 crédit
Prix réduit: 27,83 $ ou 1 crédit
-
-
-
Cryptography
- Auteur(s): Panos Louridas
- Narrateur(s): Tom Beyer
- Durée: 6 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets.
-
Cryptography
- Narrateur(s): Tom Beyer
- Durée: 6 h et 30 min
- Date de publication: 2024-10-22
- Langue: Anglais
-
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92 $ ou 1 crédit
Prix réduit: 21,92 $ ou 1 crédit
-
-
-
Security Awareness for Dummies
- Auteur(s): Ira Winkler CISSP
- Narrateur(s): Tristan Morris
- Durée: 9 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness for Dummies gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization.
-
Security Awareness for Dummies
- Narrateur(s): Tristan Morris
- Durée: 9 h et 16 min
- Date de publication: 2022-05-24
- Langue: Anglais
-
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $ ou 1 crédit
Prix réduit: 22,26 $ ou 1 crédit
-
-
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- Auteur(s): Kim Crawley
- Narrateur(s): Jo Anna Perrin
- Durée: 7 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical road map to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- Narrateur(s): Jo Anna Perrin
- Durée: 7 h et 49 min
- Date de publication: 2021-10-26
- Langue: Anglais
-
Harden your business against internal and external cybersecurity threats with a single accessible resource....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $ ou 1 crédit
Prix réduit: 22,26 $ ou 1 crédit
-
-
-
CyberSecurity Metaverse
- Auteur(s): Sajed Khan
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds. There is a lot of marketing hype wrapped up in this idea of the metaverse, from Crypto, NFT, and Blockchain to digital wardrobes. To help you get a sense of how vague and complex a term the "metaverse" can be, this audiobook is written around the parameters of what the metaverse means but more importantly cybersecurity.
-
CyberSecurity Metaverse
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $ ou 1 crédit
Prix réduit: 8,71 $ ou 1 crédit
-
-
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Date de publication: 2021-01-14
- Langue: Anglais
-
The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
The Spy Who Couldn't Spell
- A Dyslexic Traitor, an Unbreakable Code, and the FBI's Hunt for America's Stolen Secrets
- Auteur(s): Yudhijit Bhattacharjee
- Narrateur(s): Robert Fass
- Durée: 8 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Before Edward Snowden's infamous data breach, the largest theft of government secrets was committed by an ingenious traitor whose intricate espionage scheme and complex system of coded messages were made even more baffling by his dyslexia. His name is Brian Regan, but he came to be known as the Spy Who Couldn't Spell.
-
The Spy Who Couldn't Spell
- A Dyslexic Traitor, an Unbreakable Code, and the FBI's Hunt for America's Stolen Secrets
- Narrateur(s): Robert Fass
- Durée: 8 h et 11 min
- Date de publication: 2016-11-01
- Langue: Anglais
- The largest theft of government secrets was committed by a traitor whose espionage scheme and complex system of coded messages were made even more baffling by his dyslexia....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,22 $ ou 1 crédit
Prix réduit: 26,22 $ ou 1 crédit
-
-
-
The Code of Honor
- Embracing Ethics in Cybersecurity
- Auteur(s): Paul J. Maurer, Ed Skoudis
- Narrateur(s): Rick Adamson
- Durée: 5 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, president of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, president of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world.
-
The Code of Honor
- Embracing Ethics in Cybersecurity
- Narrateur(s): Rick Adamson
- Durée: 5 h et 42 min
- Date de publication: 2024-08-13
- Langue: Anglais
-
While some professions-including medicine, law, and engineering-have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92 $ ou 1 crédit
Prix réduit: 21,92 $ ou 1 crédit
-
-
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software used throughout government and critical infrastructure. Several policies and working groups at multiple levels within the U.S. Government focus on this need to ensure the authenticity, integrity, and trustworthiness of software products.
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Date de publication: 2024-01-11
- Langue: Anglais
-
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $ ou 1 crédit
Prix réduit: 8,71 $ ou 1 crédit
-