Computer Security
-
-
@War
- The Rise of the Military-Internet Complex
- Auteur(s): Shane Harris
- Narrateur(s): Stephen R. Thorne
- Durée: 9 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency, and CIA all field teams of hackers who can - and do - launch computer virus strikes against enemy targets. In fact, as @War shows, US hackers were crucial to our victory in Iraq.
-
-
Eye opening
- Écrit par Etha le 2022-08-02
-
@War
- The Rise of the Military-Internet Complex
- Narrateur(s): Stephen R. Thorne
- Durée: 9 h et 43 min
- Date de publication: 2014-11-11
- Langue: Anglais
- The United States military currently views cyberspace as the "fifth domain" of warfare - alongside land, sea, air, and space - and the Department of Defense, National Security Agency....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,15$ ou 1 crédit
Prix réduit: 20,15$ ou 1 crédit
-
-
-
Protecting Healthcare from Malware and Ransomware Exploitation
- Healthcare IT Security Best Practices (Healthcare IT Security Best Practices Series, Book 1)
- Auteur(s): Kenneth Bradberry
- Narrateur(s): Kenneth Bradberry
- Durée: 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook series is dedicated to tackling the security challenges faced by healthcare provider organizations and enhancing the patient experience. In today's healthcare landscape, Information Technology serves as a vital lifeline. Crafting robust and secure applications and infrastructure is crucial for healthcare professionals to deliver optimal patient care while safeguarding the confidentiality, integrity, and accessibility of both applications and patient data.
-
Protecting Healthcare from Malware and Ransomware Exploitation
- Healthcare IT Security Best Practices (Healthcare IT Security Best Practices Series, Book 1)
- Narrateur(s): Kenneth Bradberry
- Série: Healthcare IT Security Best Practices Series, Livre 1
- Durée: 53 min
- Date de publication: 2023-10-19
- Langue: Anglais
-
This audiobook series is dedicated to tackling the security challenges faced by healthcare provider organizations and enhancing the patient experience....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Cybersecurity
- Learn Fast How to Become an InfoSec Pro 3 Books in 1
- Auteur(s): John Knowles
- Narrateur(s): Scott Clem
- Durée: 14 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Three audiobooks in one deal: book 1: How to Establish Effective Security Management Functions; book 2: How to Apply the NIST Risk Management Framework; book 3: How to Manage Risk, Using the NIST Cybersecurity Framework. You will learn in Book 1: objectives of security management, security management principles, defense in depth, how to apply security controls, and security control functions.
-
Cybersecurity
- Learn Fast How to Become an InfoSec Pro 3 Books in 1
- Narrateur(s): Scott Clem
- Durée: 14 h
- Date de publication: 2020-12-17
- Langue: Anglais
-
Three audiobooks in one deal: book 1: How to Establish Effective Security Management Functions; book 2: How to Apply the NIST Risk Management Framework; book 3: How to Manage Risk, Using the NIST Cybersecurity Framework....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 44,57$ ou 1 crédit
Prix réduit: 44,57$ ou 1 crédit
-
-
-
Guarding the Gates
- A Small Business Guide to Cybersecurity
- Auteur(s): Alistair Campbell
- Narrateur(s): Alistair Campbell
- Durée: 2 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In today’s digital landscape, small businesses face an ever-increasing array of cybersecurity threats. Guarding the Gates: A Small Business Guide to Cybersecurity is the ultimate guide designed specifically for entrepreneurs like you who want to protect their valuable digital assets. This comprehensive resource breaks down complex concepts into easy-to-understand language, providing actionable strategies that can be implemented immediately.
-
Guarding the Gates
- A Small Business Guide to Cybersecurity
- Narrateur(s): Alistair Campbell
- Durée: 2 h et 17 min
- Date de publication: 2025-01-15
- Langue: Anglais
-
In today’s digital landscape, small businesses face an ever-increasing array of cybersecurity threats. Guarding the Gates: A Small Business Guide to Cybersecurity is the ultimate guide designed specifically for entrepreneurs like you who want to protect their valuable digital assets.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Auteur(s): Hans Weber
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how can you safeguard yourself from the different threats? Let’s find out. We will also take a look at the career of a computer networking specialist and the challenges you can expect.
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Date de publication: 2020-06-12
- Langue: Anglais
-
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how to safeguard yourself from the different threats? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process.
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Date de publication: 2023-10-10
- Langue: Anglais
-
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity and Privacy Law Introduction
- Auteur(s): Convocourses
- Narrateur(s): Kim Pepper
- Durée: 3 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice.
-
Cybersecurity and Privacy Law Introduction
- Narrateur(s): Kim Pepper
- Durée: 3 h et 13 min
- Date de publication: 2024-02-22
- Langue: Anglais
-
This is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
A Practical Guide to GDPR for Small Businesses
- Auteur(s): Nick Ioannou
- Narrateur(s): Douglas Birk
- Durée: 1 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The general data protection regulation or GDPR is a 57,500+ worded legislation that applies to every business or organization that handles personal information of those citizens living in EU and the UK, regardless of the size of the organization. For many small businesses, complying with GDPR is a daunting task, but it doesn’t need to be.
-
A Practical Guide to GDPR for Small Businesses
- Narrateur(s): Douglas Birk
- Durée: 1 h et 33 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
The general data protection regulation or GDPR is a 57,500+ worded legislation that applies to every business or organization that handles personal information of those citizens living in EU and the UK, regardless of the size of the organization....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Auteur(s): David Senecal
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves. The author uses plain language to lift the veil on bots and fraud, making a topic critical to your website's security easy to understand and even easier to implement.
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Date de publication: 2024-08-27
- Langue: Anglais
-
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Cyber Resilience
- Defense-in-Depth Principles
- Auteur(s): Alan Calder
- Narrateur(s): Alan Medcroft
- Durée: 3 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional. For the foreseeable future (and perhaps beyond), the growth and prominence of data in business shows no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to organizations and people alike. However, these come at more than just a financial cost.
-
Cyber Resilience
- Defense-in-Depth Principles
- Narrateur(s): Alan Medcroft
- Durée: 3 h et 20 min
- Date de publication: 2023-12-21
- Langue: Anglais
-
We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The Black Scorpion Pilot
- A Ford Stevens Military-Aviation Thriller, Volume 2
- Auteur(s): Lawrence A. Colby
- Narrateur(s): Christopher Raab
- Durée: 9 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In a hidden base in China, Lieutenant General He Chen licks his wounds. The Devil Dragon project lies in ruins, thanks to the heroics of US Air Force Reserve Captain Ford Stevens and Stevens's best friend, pilot Wu Lee. But now Lee is gone, and as Stevens mourns the loss of his friend, Chen works to complete his second spy plane, codenamed Black Scorpion.
-
The Black Scorpion Pilot
- A Ford Stevens Military-Aviation Thriller, Volume 2
- Narrateur(s): Christopher Raab
- Série: Ford Stevens Military-Aviation Thrillers, Livre 2
- Durée: 9 h et 19 min
- Date de publication: 2019-05-29
- Langue: Anglais
-
In a hidden base in China, Lieutenant General He Chen licks his wounds. The Devil Dragon project lies in ruins, thanks to the heroics of US Air Force Reserve Captain Ford Stevens and Stevens's best friend, pilot Wu Lee....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
The Cyber War Is Here
- U.S. and Global Infrastructure Under Attack: A CISO’s Perspective
- Auteur(s): Marc Crudgington
- Narrateur(s): Robert Plank
- Durée: 5 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
"The Cyber War Is Here" simplifies the complex world of cybersecurity, cyber risk, and the crucial relationship between corporate boards and Chief Information Security Officers (CISOs). Written by a distinguished cybersecurity expert and USAF Veteran, it emphasizes the strategic importance of cybersecurity in modern business. Marc highlights the evolving role of CISOs, emphasizing their shift from IT guardians to strategic advisors to the board. The book explores successful board-CISO interactions and the consequences of misalignment, offering a clear blueprint for effective partnership.
-
The Cyber War Is Here
- U.S. and Global Infrastructure Under Attack: A CISO’s Perspective
- Narrateur(s): Robert Plank
- Durée: 5 h et 50 min
- Date de publication: 2024-10-22
- Langue: Anglais
-
"The Cyber War Is Here" simplifies the complex world of cybersecurity, cyber risk, and the crucial relationship between corporate boards and Chief Information Security Officers (CISOs).
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Cryptography
- Auteur(s): Panos Louridas
- Narrateur(s): Tom Beyer
- Durée: 6 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets.
-
Cryptography
- Narrateur(s): Tom Beyer
- Durée: 6 h et 30 min
- Date de publication: 2024-10-22
- Langue: Anglais
-
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- Auteur(s): Taimur Ijlal
- Narrateur(s): Craig Neutzling
- Durée: 1 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- Narrateur(s): Craig Neutzling
- Durée: 1 h et 31 min
- Date de publication: 2023-07-22
- Langue: Anglais
-
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Hacking: A Beginners Guide to Your First Computer Hack
- Learn to Crack a Wireless Network, Basic Security Penetration Made Easy and Step-by-Step Kali Linux
- Auteur(s): Kevin White
- Narrateur(s): Matt Montanez
- Durée: 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking will demand your full dedication and interest and also a desire and a craving for knowledge and constant advancement. If your goal is to be a hacker, this is the audiobook to start with! This audiobook contains proven steps and strategies on how to hack a wireless network, carry out a penetration test, and so much more. It gives an insight to the most used hacking techniques and how to develop your basic skills.
-
Hacking: A Beginners Guide to Your First Computer Hack
- Learn to Crack a Wireless Network, Basic Security Penetration Made Easy and Step-by-Step Kali Linux
- Narrateur(s): Matt Montanez
- Durée: 31 min
- Date de publication: 2018-02-26
- Langue: Anglais
-
This audiobook contains proven steps and strategies on how to hack a wireless network, carry out a penetration test, and so much more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
Evolving Electric Power Systems and Cybersecurity
- Auteur(s): Congressional Research Service
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging, and one of the tools for modernizing the system is the incorporation of computerized systems that allow for the rapid monitoring and control of the equipment used in the grid. Connecting these systems to the internet has increased the ability to remotely control aspects of the grid, but this has come with increasing concern for the grid’s cybersecurity.
-
Evolving Electric Power Systems and Cybersecurity
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Date de publication: 2021-11-29
- Langue: Anglais
-
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 1 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- Narrateur(s): Frank Block
- Série: NIST 800 Cybersecurity, Livre 1
- Durée: 1 h et 32 min
- Date de publication: 2022-06-22
- Langue: Anglais
-
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Date de publication: 2022-04-04
- Langue: Anglais
-
This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Auteur(s): L.D. Knowings
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-