Computer Security
-
-
Because You Can: Your Cybersecurity Career
- A Simple and Practical Handbook with Actionable Insights for Success
- Auteur(s): Ali Khan, Gaurav Kumar, Arlene Worsley
- Narrateur(s): Skye Alley
- Durée: 9 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most sought-after professionals. Cybersecurity is one of the hottest jobs on the market today, with comparatively high wages and unparalleled growth opportunities. With the organic move to the cloud, digital-first initiatives, and the socioeconomic pressures from the pandemic, the cybersecurity talent demand is unprecedented.
-
Because You Can: Your Cybersecurity Career
- A Simple and Practical Handbook with Actionable Insights for Success
- Narrateur(s): Skye Alley
- Durée: 9 h et 42 min
- Date de publication: 2022-04-20
- Langue: Anglais
-
As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most sought-after professionals. Cybersecurity is one of the hottest jobs on the market today, with comparatively high wages and unparalleled growth opportunities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Auteur(s): Prabath Siriwardena, Nuwan Dias
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication.
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Date de publication: 2021-03-17
- Langue: Anglais
-
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53$ ou 1 crédit
Prix réduit: 37,53$ ou 1 crédit
-
-
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Auteur(s): Gabriella Coleman
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Date de publication: 2017-01-31
- Langue: Anglais
- Anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,82$ ou 1 crédit
Prix réduit: 22,82$ ou 1 crédit
-
-
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Auteur(s): Alan T. Norman
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity. The audiobook concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks. Gain the ability to do ethical hacking and penetration testing by taking this hacking audiobook!
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Date de publication: 2019-10-03
- Langue: Anglais
-
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Computer Hacking Beginners Guide
- How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
- Auteur(s): Alan T. Norman
- Narrateur(s): Jack Ares
- Durée: 1 h et 57 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book will teach you how you can protect yourself from most common hacking attacks - by knowing how hacking actually works! After all, in order to prevent your system from being compromised, you need to stay a step ahead of any criminal hacker. You can do that by learning how to hack and how to do a counter-hack.
-
Computer Hacking Beginners Guide
- How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
- Narrateur(s): Jack Ares
- Durée: 1 h et 57 min
- Date de publication: 2019-09-19
- Langue: Anglais
-
This book will teach you how you can protect yourself from most common hacking attacks - by knowing how hacking actually works....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- Auteur(s): Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
- Narrateur(s): Rich Boniface
- Durée: 15 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.
-
Cybersecurity Myths and Misconceptions
- Avoiding the Hazards and Pitfalls that Derail Us
- Narrateur(s): Rich Boniface
- Durée: 15 h et 8 min
- Date de publication: 2024-04-26
- Langue: Anglais
-
In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,27$ ou 1 crédit
Prix réduit: 31,27$ ou 1 crédit
-
-
-
Secret Empire
- Eisenhower, CIA, and the Hidden Story of America's Space Espionage
- Auteur(s): Philip Taubman
- Narrateur(s): Michael Prichard
- Durée: 15 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
During the early and most dangerous years of the cold war, a handful of Americans, led by President Dwight D. Eisenhower, revolutionized spying and warfare. In great secrecy and beyond the prying eyes of Congress and the press, they built exotic new machines that opened up the Soviet Union to surveillance and protected the United States from surprise nuclear attack. Secret Empire is the dramatic story of these men and their inventions, told in full for the first time.
-
Secret Empire
- Eisenhower, CIA, and the Hidden Story of America's Space Espionage
- Narrateur(s): Michael Prichard
- Durée: 15 h et 40 min
- Date de publication: 2004-02-26
- Langue: Anglais
- During the early and most dangerous years of the cold war, a handful of Americans, led by President Dwight D. Eisenhower, revolutionized spying and warfare....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,05$ ou 1 crédit
Prix réduit: 25,05$ ou 1 crédit
-
-
-
How to Measure Anything in Cybersecurity Risk
- Auteur(s): Douglas W. Hubbard, Richard Seiersen
- Narrateur(s): Patrick Cronin
- Durée: 10 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
How to Measure Anything in Cybersecurity Risk
- Narrateur(s): Patrick Cronin
- Durée: 10 h et 21 min
- Date de publication: 2016-11-29
- Langue: Anglais
- This book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Auteur(s): Aram Sinnreich, Jesse Gilbert
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.
-
The Secret Life of Data
- Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance
- Narrateur(s): Jonathan Todd Ross
- Durée: 11 h et 4 min
- Date de publication: 2024-04-30
- Langue: Anglais
-
Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- Auteur(s): Kim Crawley
- Narrateur(s): Jo Anna Perrin
- Durée: 7 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical road map to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- Narrateur(s): Jo Anna Perrin
- Durée: 7 h et 49 min
- Date de publication: 2021-10-26
- Langue: Anglais
-
Harden your business against internal and external cybersecurity threats with a single accessible resource....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Big Tech Tyrants
- How Silicon Valley's Stealth Practices Addict Teens, Silence Speech and Steal Your Privacy
- Auteur(s): Floyd Brown, Todd Cefaratti
- Narrateur(s): Shawn Compton
- Durée: 8 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Big Tech Tyrants boast riches beyond emperors of old but act like juveniles who don't want to grow up. They are modern-day robber barons. Big Tech Tyrants don't know the meaning of privacy, when it comes to you. They try to make you believe they will give their products away for free as a service to society, when really, they are vacuuming your personal data. They use this data to discover your deepest secrets. Big Tech Tyrants is an eye-opening, must-listen book for anyone living in the 21st century.
-
-
We Live in "1984"
- Écrit par Jake L.S. le 2019-09-04
-
Big Tech Tyrants
- How Silicon Valley's Stealth Practices Addict Teens, Silence Speech and Steal Your Privacy
- Narrateur(s): Shawn Compton
- Durée: 8 h et 49 min
- Date de publication: 2019-09-03
- Langue: Anglais
-
"Boy Kings," or Big Tech Tyrants, are considered the most powerful individuals in the world. They're the autocratic aristocrats who run the tech giants in Silicon Valley, and these social platform operators have gained a non-elected (or, should we say, a self-elected) authoritarian power....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Auteur(s): Clint Watts
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns that have become the cutting edge of modern warfare - and how we can protect ourselves against them. Clint Watts electrified the nation when he testified regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind.
-
-
Interesting and engaging
- Écrit par Mark Dynna le 2018-07-18
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Date de publication: 2018-05-29
- Langue: Anglais
-
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare - and how we can protect ourselves and our country against them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,46$ ou 1 crédit
Prix réduit: 31,46$ ou 1 crédit
-
-
-
Obfuscation
- A User's Guide for Privacy and Protest
- Auteur(s): Finn Brunton, Helen Nissenbaum
- Narrateur(s): Dana Hickox
- Durée: 4 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance - the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy-protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data-collection projects.
-
Obfuscation
- A User's Guide for Privacy and Protest
- Narrateur(s): Dana Hickox
- Durée: 4 h et 21 min
- Date de publication: 2015-12-07
- Langue: Anglais
- Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,00$ ou 1 crédit
Prix réduit: 21,00$ ou 1 crédit
-
-
-
The Wires of War
- Technology and the Global Struggle for Power
- Auteur(s): Jacob Helberg
- Narrateur(s): Jesse Einstein
- Durée: 11 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
From 2016 to 2020, Jacob Helberg led Google’s global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war between democracy and autocracy.
-
-
Excellent Review of Current Situation
- Écrit par Ian R. Graham le 2022-07-02
-
The Wires of War
- Technology and the Global Struggle for Power
- Narrateur(s): Jesse Einstein
- Durée: 11 h et 32 min
- Date de publication: 2021-10-12
- Langue: Anglais
-
From 2016 to 2020, Jacob Helberg led Google’s global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,37$ ou 1 crédit
Prix réduit: 26,37$ ou 1 crédit
-
-
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Date de publication: 2024-05-28
- Langue: Anglais
-
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The New World Economy
- A Beginner's Guide
- Auteur(s): Randy Charles Epping
- Narrateur(s): George Newbern
- Durée: 6 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As the global economic landscape shifts at an increasing rate, it's more important than ever that citizens understand the building blocks of the new world economy. In this lively guide, Randy Charles Epping cuts through the jargon to explain the fundamentals. In 36 engaging chapters, Epping lays bare everything from NGOs and nonprofits to AI and data mining. With a comprehensive glossary and absolutely no graphs, The New World Economy: A Beginner's Guide is essential listening for anyone who wants to understand what is going on in the world around them.
-
The New World Economy
- A Beginner's Guide
- Narrateur(s): George Newbern
- Durée: 6 h et 49 min
- Date de publication: 2020-01-21
- Langue: Anglais
-
As the global economic landscape shifts at an increasing rate, it's more important than ever that citizens understand the building blocks of the new world economy. In this lively guide, Randy Charles Epping cuts through the jargon to explain the fundamentals....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,48$ ou 1 crédit
Prix réduit: 17,48$ ou 1 crédit
-
-
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- Auteur(s): Thomas J. Parenty, Jack J. Domet
- Narrateur(s): Jonathan Todd Ross
- Durée: 5 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- Narrateur(s): Jonathan Todd Ross
- Durée: 5 h et 47 min
- Date de publication: 2019-12-03
- Langue: Anglais
-
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Auteur(s): Raymond Phillips
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself. I am sure if you are considering this book, you too have a reason, but going through this process, I have learned a few valuable lessons. This book is all about those lessons, so you don't have to learn on the go as I had to. Instead, you can use this book as a guide and just follow the step by step process and see yourself disappear from the big World Wide Web.
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Date de publication: 2016-12-14
- Langue: Anglais
- Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 5,31$ ou 1 crédit
Prix réduit: 5,31$ ou 1 crédit
-
-
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- Auteur(s): Christian Espinosa
- Narrateur(s): Kaleo Griffith
- Durée: 6 h et 54 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
wisdom doesn’t go past the title
- Écrit par Douglas Lowney le 2023-01-14
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- Narrateur(s): Kaleo Griffith
- Durée: 6 h et 54 min
- Date de publication: 2021-03-08
- Langue: Anglais
-
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,19$ ou 1 crédit
Prix réduit: 20,19$ ou 1 crédit
-
-
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- Auteur(s): Razi Rais, Christina Morillo, Evan Gilman, Autres
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 5 min
- Date de publication: 2024-06-04
- Langue: Anglais
-
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-