Computer Security
-
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Auteur(s): Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Date de publication: 2024-02-20
- Langue: Anglais
-
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Auteur(s): Raymond Phillips
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself. I am sure if you are considering this book, you too have a reason, but going through this process, I have learned a few valuable lessons. This book is all about those lessons, so you don't have to learn on the go as I had to. Instead, you can use this book as a guide and just follow the step by step process and see yourself disappear from the big World Wide Web.
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Date de publication: 2016-12-14
- Langue: Anglais
- Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 5,31$ ou 1 crédit
Prix réduit: 5,31$ ou 1 crédit
-
-
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- Auteur(s): Jonathan Rigdon
- Narrateur(s): Kevin Brooker
- Durée: 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- Narrateur(s): Kevin Brooker
- Durée: 51 min
- Date de publication: 2024-06-25
- Langue: Anglais
-
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 3,02$ ou 1 crédit
Prix réduit: 3,02$ ou 1 crédit
-
-
-
Ten Steps to ITSM Success
- Auteur(s): Timothy Rogers, Angelo Esposito
- Narrateur(s): Peter Silverleaf
- Durée: 6 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As organizations seek to boost revenue, cut costs, and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. Ten Steps to ITSM Success helps IT to prepare for this role by providing a detailed and practical guide to implementing ITSM best practices. It is aimed at ITSM practitioners and consultants, but will also be of interest to IT directors and C-suite executives looking to transform the role of IT into a value-creating business partner.
-
Ten Steps to ITSM Success
- Narrateur(s): Peter Silverleaf
- Durée: 6 h et 42 min
- Date de publication: 2018-12-10
- Langue: Anglais
-
As organizations seek to boost revenue, cut costs, and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. This guide helps IT to prepare for this role by providing a detailed and practical guide to implementing ITSM best practices....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Auteur(s): Zeynep Tufekci
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
An incisive observer, writer, and participant in today's social movements, Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests, and why they have difficulty persisting in their long-term quests for change.
-
-
A must read for those interested in social media
- Écrit par Bijan le 2018-09-13
-
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Date de publication: 2017-05-16
- Langue: Anglais
- Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing. Authored by seasoned cybersecurity experts, this comprehensive book provides an immersive journey through the critical principles, methodologies, and practical applications needed to navigate the CompTIA Pentest+ Certification.
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 8 min
- Date de publication: 2023-12-07
- Langue: Anglais
-
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
CC Certified in Cybersecurity All-in-One Exam Guide
- Auteur(s): Jordan Genung, Steven Bennett
- Narrateur(s): Mike Chamberlain
- Durée: 11 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Take the Certified in Cybersecurity exam from (ISC)2 with confidence using the information contained in this comprehensive study guide. Written by a pair of cybersecurity experts and successful trainers, CC Certified in Cybersecurity All-in-One Exam Guide offers background material, detailed examples, and over 200 practice questions.
-
CC Certified in Cybersecurity All-in-One Exam Guide
- Narrateur(s): Mike Chamberlain
- Durée: 11 h et 42 min
- Date de publication: 2024-07-09
- Langue: Anglais
-
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,30$ ou 1 crédit
Prix réduit: 26,30$ ou 1 crédit
-
-
-
Cybersecurity for Beginners
- Auteur(s): Raef Meeuwisse
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
Cybersecurity for Beginners
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Date de publication: 2017-09-21
- Langue: Anglais
- This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Kingdom of Lies
- Unnerving Adventures in the World of Cybercrime
- Auteur(s): Kate Fazzini
- Narrateur(s): Khristine Hvam
- Durée: 6 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In the tradition of Michael Lewis and Tom Wolfe, a fascinating and frightening behind-the-scenes look at the interconnected cultures of hackers, security specialists, and law enforcement. A cybersecurity professional turned journalist, Kate Fazzini illuminates the many lies companies and governments tell us about our security, the lies criminals tell to get ahead, and the lies security leaders tell to make us think they are better at their jobs than they are.
-
Kingdom of Lies
- Unnerving Adventures in the World of Cybercrime
- Narrateur(s): Khristine Hvam
- Durée: 6 h et 19 min
- Date de publication: 2019-06-11
- Langue: Anglais
-
In the tradition of Michael Lewis and Tom Wolfe, a fascinating and frightening behind-the-scenes look at the interconnected cultures of hackers, security specialists, and law enforcement....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,99$ ou 1 crédit
Prix réduit: 19,99$ ou 1 crédit
-
-
-
Secret Key Cryptography
- Ciphers, from Simple to Unbreakable
- Auteur(s): Frank Rubin
- Narrateur(s): Christopher Kendrick
- Durée: 16 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Secret Key Cryptography gives you a toolbox of cryptographic techniques and secret key methods. The audiobook’s simple, non-technical language is easy to understand and is accessible for any listener even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches including a never-before-seen way to implement the uncrackable one-time pad algorithm. Whoever you are, this audiobook is for you!
-
Secret Key Cryptography
- Ciphers, from Simple to Unbreakable
- Narrateur(s): Christopher Kendrick
- Durée: 16 h et 49 min
- Date de publication: 2023-01-26
- Langue: Anglais
-
Explore the fascinating and rich world of Secret Key Cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes including 30 unbreakable methods.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
The Art of Attack
- Attacker Mindset for Security Professionals
- Auteur(s): Maxie Reynolds
- Narrateur(s): Stephanie Dillard
- Durée: 9 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
The Art of Attack
- Attacker Mindset for Security Professionals
- Narrateur(s): Stephanie Dillard
- Durée: 9 h et 50 min
- Date de publication: 2021-11-16
- Langue: Anglais
-
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
How to Measure Anything in Cybersecurity Risk
- Auteur(s): Douglas W. Hubbard, Richard Seiersen
- Narrateur(s): Patrick Cronin
- Durée: 10 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
How to Measure Anything in Cybersecurity Risk
- Narrateur(s): Patrick Cronin
- Durée: 10 h et 21 min
- Date de publication: 2016-11-29
- Langue: Anglais
- This book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
Come and Take It
- The Gun Printer's Guide to Thinking Free
- Auteur(s): Cody Wilson
- Narrateur(s): Kirby Heyborne
- Durée: 7 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cody Wilson, a self-described crypto-anarchist and rogue thinker, combines the controversial yet thrilling story of the production of the first ever 3D printable gun with a startling philosophical manifesto that gets to the heart of the 21st-century debate over the freedom of information and ideas.
-
-
Not a very compelling tale, although interesting.
- Écrit par Amazon Customer le 2020-03-19
-
Come and Take It
- The Gun Printer's Guide to Thinking Free
- Narrateur(s): Kirby Heyborne
- Durée: 7 h et 51 min
- Date de publication: 2016-10-11
- Langue: Anglais
- Cody Wilson, a self-described crypto-anarchist and rogue thinker, combines the controversial yet thrilling story of the production of the first ever 3-D printable gun with a philosophical manifesto....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,99$ ou 1 crédit
Prix réduit: 19,99$ ou 1 crédit
-
-
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Auteur(s): Jack Jones
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want, do what you want, and buy whatever you want. But there is so much more to the deep web than the Hollywood picture of a lawless frontier land. Sure, there are illicit elements to it. It can be a dangerous place if you don't know what you are doing. But, with all that, it should be remembered what the deep web is all about - it's about freedom of speech in a world of censorship and political correctness.
-
-
Provides some practical information
- Écrit par Mary-Anne le 2018-12-15
-
Accessing the Deep Web & Dark Web with Tor
- How to Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access the Deep Web & Dark Web
- Narrateur(s): Dan Gralick
- Durée: 1 h et 4 min
- Date de publication: 2017-07-14
- Langue: Anglais
- It's something you have probably heard about in some Hollywood blockbuster - the deep web. It's the last online frontier. The place where you can say what you want and buy whatever you want....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Auteur(s): Garrett Sutton Esq., Robert T. Kiyosaki - foreword
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Deceptive misinformation comes at us for many reasons. A key one is to steal our assets. We are free to communicate and stay connected in many ways. This great benefit, however, is now abused by criminal elements to take and defraud, bringing shame on trusting souls. The wreckage wrought by cyber criminality is not only financial but highly emotional. Lives are lost to depression and suicide. Don’t let this happen to you or your family. Scam Proof Your Assets: Guarding Against Widespread Deception gives you the tools and context for protecting yourself.
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Date de publication: 2021-05-03
- Langue: Anglais
-
Scam Proof Your Assets gives you the tools and context for protecting yourself. Unlike other sources, Scam Proof Your Assets teaches you the patterns to look for, including greed and fear, "expert" positioning and charm as manipulation....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 28,27$ ou 1 crédit
Prix réduit: 28,27$ ou 1 crédit
-
-
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- Auteur(s): Brian Krebs
- Narrateur(s): Christopher Lane
- Durée: 8 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
-
-
Wonderfully in-depth look into Russian email spam
- Écrit par Mitchell le 2018-10-10
-
Spam Nation
- The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- Narrateur(s): Christopher Lane
- Durée: 8 h et 46 min
- Date de publication: 2014-11-18
- Langue: Anglais
- In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,00$ ou 1 crédit
Prix réduit: 26,00$ ou 1 crédit
-
-
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Auteur(s): Ed Adams
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone.
-
See Yourself in Cyber
- Security Careers Beyond Hacking
- Narrateur(s): Rich Miller
- Durée: 7 h et 16 min
- Date de publication: 2024-03-26
- Langue: Anglais
-
In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization can contribute to improving its cybersecurity backbone.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- Auteur(s): Steven Levy
- Narrateur(s): Rich Miller
- Durée: 14 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that is already affecting every citizen in the 21st century. Crypto tells the inside story of how a group of "crypto rebels" - nerds and visionaries turned freedom fighters - teamed up with corporate interests to beat Big Brother and ensure our privacy on the internet.
-
Crypto
- How the Code Rebels Beat the Government - Saving Privacy in the Digital Age
- Narrateur(s): Rich Miller
- Durée: 14 h et 2 min
- Date de publication: 2021-04-27
- Langue: Anglais
-
If you've ever made a secure purchase with your credit card over the internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy - the author who made "hackers" a household word - comes this account of a revolution that affects every citizen in the 21st century....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- Auteur(s): Christian Espinosa
- Narrateur(s): Kaleo Griffith
- Durée: 6 h et 54 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
wisdom doesn’t go past the title
- Écrit par Douglas Lowney le 2023-01-14
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- Narrateur(s): Kaleo Griffith
- Durée: 6 h et 54 min
- Date de publication: 2021-03-08
- Langue: Anglais
-
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,19$ ou 1 crédit
Prix réduit: 20,19$ ou 1 crédit
-
-
-
Protecting Healthcare from Malware and Ransomware Exploitation
- Healthcare IT Security Best Practices (Healthcare IT Security Best Practices Series, Book 1)
- Auteur(s): Kenneth Bradberry
- Narrateur(s): Kenneth Bradberry
- Durée: 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook series is dedicated to tackling the security challenges faced by healthcare provider organizations and enhancing the patient experience. In today's healthcare landscape, Information Technology serves as a vital lifeline. Crafting robust and secure applications and infrastructure is crucial for healthcare professionals to deliver optimal patient care while safeguarding the confidentiality, integrity, and accessibility of both applications and patient data.
-
Protecting Healthcare from Malware and Ransomware Exploitation
- Healthcare IT Security Best Practices (Healthcare IT Security Best Practices Series, Book 1)
- Narrateur(s): Kenneth Bradberry
- Série: Healthcare IT Security Best Practices Series, Livre 1
- Durée: 53 min
- Date de publication: 2023-10-19
- Langue: Anglais
-
This audiobook series is dedicated to tackling the security challenges faced by healthcare provider organizations and enhancing the patient experience....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-