Computer Security
-
-
Surveillance Valley
- The Secret Military History of the Internet
- Auteur(s): Yasha Levine
- Narrateur(s): LJ Ganser
- Durée: 10 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news - and the device on which you read it.
-
-
A History Lesson Everyone Should Know
- Écrit par JJHicks le 2024-04-15
-
Surveillance Valley
- The Secret Military History of the Internet
- Narrateur(s): LJ Ganser
- Durée: 10 h et 42 min
- Date de publication: 2018-03-20
- Langue: Anglais
- In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the Internet, tracing it back to a Pentagon counterinsurgency surveillance project....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- Auteur(s): Eric Conrad, Seth Misenar, Joshua Feldman
- Narrateur(s): Matthew E. Kelly
- Durée: 10 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- Narrateur(s): Matthew E. Kelly
- Durée: 10 h et 4 min
- Date de publication: 2021-01-11
- Langue: Anglais
-
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- Auteur(s): David E. Sanger
- Narrateur(s): Robertson Dean
- Durée: 12 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
Great deep dive into cyberweapons
- Écrit par Alek Luopa le 2018-09-14
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- Narrateur(s): Robertson Dean
- Durée: 12 h et 53 min
- Date de publication: 2018-06-19
- Langue: Anglais
-
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Auteur(s): Norman Laurence
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- Narrateur(s): Cole Niblett
- Durée: 14 h et 4 min
- Date de publication: 2020-10-21
- Langue: Anglais
-
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Developer's Playbook for Large Language Model Security
- Building Secure AI Applications
- Auteur(s): Steve Wilson
- Narrateur(s): Jonathan Yen
- Durée: 8 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models.
-
The Developer's Playbook for Large Language Model Security
- Building Secure AI Applications
- Narrateur(s): Jonathan Yen
- Durée: 8 h et 27 min
- Date de publication: 2025-05-13
- Langue: Anglais
-
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Auteur(s): Lance Henderson
- Narrateur(s): James C. Lewis
- Durée: 12 h et 57 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
-
-
Nothing about Kali Linux
- Écrit par Utilisateur anonyme le 2020-01-11
-
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
- Narrateur(s): James C. Lewis
- Durée: 12 h et 57 min
- Date de publication: 2018-06-07
- Langue: Anglais
-
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
31,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Auteur(s): Roger A. Grimes
- Narrateur(s): Mike Lenz
- Durée: 13 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
-
Taming the Hacking Storm
- A Framework for Defeating Hackers and Malware
- Narrateur(s): Mike Lenz
- Durée: 13 h et 30 min
- Date de publication: 2025-07-01
- Langue: Anglais
-
An insightful and original new approach to cybersecurity, Taming the Hacking Storm is a must-listen guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Truth Machine
- The Blockchain and the Future of Everything
- Auteur(s): Michael J Casey, Paul Vigna
- Narrateur(s): Sean Runnette
- Durée: 10 h et 24 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The Truth Machine, Michael J. Casey and Paul Vigna demystify the blockchain and explain why it can restore personal control over our data, assets, and identities; grant billions of excluded people access to the global economy; and shift the balance of power to revive society’s faith in itself. They reveal the disruption it promises for industries including finance, tech, legal, and shipping.
-
-
The best book on blockchain use cases so far...
- Écrit par Ben West le 2018-10-18
-
The Truth Machine
- The Blockchain and the Future of Everything
- Narrateur(s): Sean Runnette
- Durée: 10 h et 24 min
- Date de publication: 2018-02-27
- Langue: Anglais
-
Michael J. Casey and Paul Vigna demystify the blockchain and explain why it can restore personal control over our data, assets, and identities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,67 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- Auteur(s): Roger A. Grimes
- Narrateur(s): Jonathan Todd Ross
- Durée: 10 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- Narrateur(s): Jonathan Todd Ross
- Durée: 10 h et 46 min
- Date de publication: 2019-10-08
- Langue: Anglais
-
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- Auteur(s): Douglas W. Hubbard, Richard Seiersen
- Narrateur(s): Jim Seybert
- Durée: 14 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.
-
How to Measure Anything in Cybersecurity Risk (2nd Edition)
- Narrateur(s): Jim Seybert
- Durée: 14 h et 5 min
- Date de publication: 2023-04-25
- Langue: Anglais
-
A pioneering information security professional and a leader in quantitative analysis methods deliver yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
27,83 $ ou gratuit avec l'essai de 30 jours
-
-
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Auteur(s): L.D. Knowings
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- Auteur(s): Phil Champagne
- Narrateur(s): Stephanie Murphy
- Durée: 7 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Book of Satoshi, the collected writings of Satoshi Nakamoto, creator of the bitcoin. The foreword was written by Jeff Berwick.
-
-
Any writer would be ashamed
- Écrit par Mishipeshu le 2021-08-25
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- Narrateur(s): Stephanie Murphy
- Durée: 7 h et 27 min
- Date de publication: 2015-04-20
- Langue: Anglais
- The book of Satoshi, the collected writings of Satoshi Nakamoto....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Auteur(s): George Finney, John Kindervag - foreword
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Date de publication: 2022-10-04
- Langue: Anglais
-
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
22,26 $ ou gratuit avec l'essai de 30 jours
-
-
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- Auteur(s): Jeremiah Talamantes
- Narrateur(s): Joe Smith
- Durée: 4 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration. Learn how to conduct a Physical Red Team Operation with precision, confidence, and value. Whether the listener will be hired at some point to penetrate security or simply trying to harden his or her own defenses, this audiobook is essential.
-
Physical Red Team Operations
- Physical Penetration Testing with the REDTEAMOPSEC Methodology
- Narrateur(s): Joe Smith
- Durée: 4 h et 18 min
- Date de publication: 2019-12-10
- Langue: Anglais
-
A manual for the very first physical red team operation methodology, REDTEAMOPSEC. This audiobook teaches how to execute every stage of a physical red team operation from reconnaissance to team mobilization, to offensive strike, and exfiltration....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Scam Me If You Can
- Simple Strategies to Outsmart Today's Rip-off Artists
- Auteur(s): Frank Abagnale
- Narrateur(s): Jason Culp
- Durée: 9 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you at risk of being scammed? Former con artist and best-selling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks. Maybe you're wondering how to make the scam phone calls stop. Perhaps someone has stolen your credit card number. Or you've been a victim of identity theft. Even if you haven't yet been the target of a crime, con artists are always out there, waiting for the right moment to steal your information, your money, and your life.
-
-
Not good and very slow.
- Écrit par linh Diep le 2024-01-12
-
Scam Me If You Can
- Simple Strategies to Outsmart Today's Rip-off Artists
- Narrateur(s): Jason Culp
- Durée: 9 h et 11 min
- Date de publication: 2019-08-27
- Langue: Anglais
-
Are you at risk of being scammed? Former con artist and best-selling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
23,31 $ ou gratuit avec l'essai de 30 jours
-
-
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- Auteur(s): Byron Tau
- Narrateur(s): Sean Patrick Hopkins
- Durée: 11 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring.
-
Means of Control
- How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State
- Narrateur(s): Sean Patrick Hopkins
- Durée: 11 h et 6 min
- Date de publication: 2024-02-27
- Langue: Anglais
-
For the past five years—ever since a chance encounter at a dinner party—journalist Byron Tau has been piecing together a secret story: how the whole of the internet and every digital device in the world became a mechanism of intelligence, surveillance, and monitoring....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
26,22 $ ou gratuit avec l'essai de 30 jours
-
-
-
No Safe Harbor
- The Inside Truth About Cybercrime - and How to Protect Your Business
- Auteur(s): Mark Sangster
- Narrateur(s): Kevin Stillwell
- Durée: 5 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster tells listeners that cybersecurity is not an IT problem to solve - it is a business risk to manage.
-
No Safe Harbor
- The Inside Truth About Cybercrime - and How to Protect Your Business
- Narrateur(s): Kevin Stillwell
- Durée: 5 h et 27 min
- Date de publication: 2020-12-11
- Langue: Anglais
-
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity for Beginners
- Auteur(s): Raef Meeuwisse
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
Cybersecurity for Beginners
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Date de publication: 2017-09-21
- Langue: Anglais
- This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-
-
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Auteur(s): Kelly Shortridge, Aaron Rinehart - contributor
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
-
-
Great content but horribly annoying computer voice
- Écrit par Utilisateur anonyme le 2024-04-08
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- Narrateur(s): April Doty
- Durée: 18 h et 36 min
- Date de publication: 2023-11-28
- Langue: Anglais
-
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
33,40 $ ou gratuit avec l'essai de 30 jours
-
-
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- Auteur(s): Glenn Greenwald
- Narrateur(s): L. J. Ganser
- Durée: 9 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- Narrateur(s): L. J. Ganser
- Durée: 9 h et 49 min
- Date de publication: 2014-08-19
- Langue: Anglais
- Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
25,00 $ ou gratuit avec l'essai de 30 jours
-