Computer Security
-
-
Improving Security of Open Source Software in Operational Technology and Industrial Control Systems
- Auteur(s): CISA FBI NSA Department of Treasury
- Narrateur(s): Tom Brooks
- Durée: 2 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This fact sheet will assist with better management of risk from OSS use in OT products and increase resilience using available resources. While several resources and recommendations within this fact sheet are best suited for execution by the vendor or the critical infrastructure owner, collaboration across parties will result in less friction for operator workflows and promote a safer, more reliable system and provision of National Critical Functions.
-
Improving Security of Open Source Software in Operational Technology and Industrial Control Systems
- Narrateur(s): Tom Brooks
- Durée: 2 h et 28 min
- Date de publication: 2023-10-25
- Langue: Anglais
-
This fact sheet will assist with better management of risk from OSS use in OT products and increase resilience using available resources....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- Auteur(s): Josephine Wolff
- Narrateur(s): Kate Reading
- Durée: 14 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity incidents make the news with startling regularity. Each breach makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- Narrateur(s): Kate Reading
- Durée: 14 h
- Date de publication: 2018-11-13
- Langue: Anglais
-
Cybersecurity incidents make the news with startling regularity. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 23,18$ ou 1 crédit
Prix réduit: 23,18$ ou 1 crédit
-
-
-
Cybersecurity
- The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
- Auteur(s): Trust Genics
- Narrateur(s): Leon Tietz
- Durée: 3 h et 48 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk. At an individual level, a cybersecurity attack can result in everything from identity theft to extortion attempts, to the loss of important data like family photos. However, there are simple things you can do to protect yourself, your family, and your work.
-
Cybersecurity
- The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
- Narrateur(s): Leon Tietz
- Durée: 3 h et 48 min
- Date de publication: 2020-03-07
- Langue: Anglais
-
Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,08$ ou 1 crédit
Prix réduit: 9,08$ ou 1 crédit
-
-
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- Auteur(s): Scott N. Schober, Craig W. Schober
- Narrateur(s): Stephen Bowlby
- Durée: 7 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now, joined by his brother Craig, the two have set their sights on the biggest target of all: small businesses. Throughout Cybersecurity Is Everybody's Business, Scott and Craig contextualize the impact of these cyber attacks on your small business and daily lives to provide expert insight and a plan of attack for fending off future security breaches.
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- Narrateur(s): Stephen Bowlby
- Durée: 7 h et 15 min
- Date de publication: 2019-10-22
- Langue: Anglais
-
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
いまさら聞けないWeb3、NFT、メタバースについて増田雅史先生に聞いてみた
- Série: 〇〇先生に聞いてみたシリーズ, Livre 増田 雅史 先生
- Durée: 5 h et 26 min
- Date de publication: 2025-05-30
- Langue: Japonais
- 驚異的な勢いでビジネス化が進む「メタバース」や「NFT」、今後注目される「DAO」「Web3」について、イラストでわかりやすく解説。誰もが抱くシンプルな疑問をひとつずつ解決します。
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 32,73$ ou 1 crédit
Prix réduit: 32,73$ ou 1 crédit
-
-
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Auteur(s): Department of Justice FBI NSA Department of State
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Date de publication: 2023-06-21
- Langue: Anglais
-
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity Jobs Resume Marketing
- Find Cybersecurity Jobs, Book 1
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 2 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
According to the White House, there are 700,000 cybersecurity positions open today. Using the techniques in this audiobook, you can be a part of one of the fastest, highest salary career paths in IT.
-
Cybersecurity Jobs Resume Marketing
- Find Cybersecurity Jobs, Book 1
- Narrateur(s): Frank Block
- Série: Find Cybersecurity Jobs, Livre 1
- Durée: 2 h et 23 min
- Date de publication: 2022-11-11
- Langue: Anglais
-
According to the White House, there are 700,000 cybersecurity positions open today. Using the techniques in this audiobook, you can be a part of one of the fastest, highest salary career paths in IT....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet. A global, multistakeholder community made up of many organizations shapes internet policy, operations, and security. But the ongoing and increasing reliance on the internet underscores the need to understand the risks to its underlying architecture.
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Auteur(s): Cybersecurity Bookstore
- Narrateur(s): Will Davidson
- Durée: 2 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security. The book is divided into eight chapters that cover various aspects of IT security and provide practical guidance on how to secure your organization's data and systems.
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Narrateur(s): Will Davidson
- Durée: 2 h
- Date de publication: 2023-10-24
- Langue: Anglais
-
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Auteur(s): Niels Starling
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security. We all think our information is at risk when actually hiding it away runs the greatest risk.
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Date de publication: 2020-12-16
- Langue: Anglais
-
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cyber Security
- Learn the Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies
- Auteur(s): Noah Zhang, Dana Onyshko
- Narrateur(s): Gary Westphalen
- Durée: 3 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Companies that can use technology wisely and well are booming, and companies that make bad or no technology choices collapse and disappear. The cloud, smart devices, and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. The bad actors are in on this, too, and it creates a real problem right now for every individual and business.
-
Cyber Security
- Learn the Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies
- Narrateur(s): Gary Westphalen
- Durée: 3 h et 42 min
- Date de publication: 2020-10-13
- Langue: Anglais
-
Companies that can use technology wisely and well are booming, and companies that make bad or no technology choices collapse and disappear. The cloud, smart devices, and the ability to connect almost any object to the internet are an essential landscape to use....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cyber Security
- How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond
- Auteur(s): Matt Reyes
- Narrateur(s): Duke Holm
- Durée: 3 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber attacks are a growing problem that’s affecting an increasing number of devices and people. The current numbers are staggering. Hackers create and deploy over 300,000 new malware programs every single day on networks, individual computers, and other devices. And there are nearly half a million ransomware attacks every year.
-
Cyber Security
- How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond
- Narrateur(s): Duke Holm
- Durée: 3 h et 12 min
- Date de publication: 2019-11-14
- Langue: Anglais
-
Cyber attacks are a growing problem that’s affecting an increasing number of devices and people. The current numbers are staggering. Hackers create and deploy over 300,000 new malware programs every single day on networks, individual computers, and other devices....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 15,10$ ou 1 crédit
Prix réduit: 15,10$ ou 1 crédit
-
-
-
The Hidden Corporation
- A Data Management Security Novel
- Auteur(s): David Schlesinger
- Narrateur(s): Bobby Hundley
- Durée: 5 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss.
-
The Hidden Corporation
- A Data Management Security Novel
- Narrateur(s): Bobby Hundley
- Durée: 5 h et 38 min
- Date de publication: 2016-09-29
- Langue: Anglais
- Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,40$ ou 1 crédit
Prix réduit: 26,40$ ou 1 crédit
-
-
-
Cybersecurity as a Fishing Game
- Developing Cybersecurity in the Form of Fishing Game and What Top Management Should Understand
- Auteur(s): Dr. Tan Kian Hua, Dr. Vladimir Biruk
- Narrateur(s): Craig Long
- Durée: 2 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Reflecting the evolution of information and communication tools and technologies via synergizing theoretical and practical skills in our audiobook, Cybersecurity as a Fishing Game, we aimed to convey, in a concise manner, the importance of cyber safety in regards to cybersecurity and the value of correct use.
-
Cybersecurity as a Fishing Game
- Developing Cybersecurity in the Form of Fishing Game and What Top Management Should Understand
- Narrateur(s): Craig Long
- Durée: 2 h et 3 min
- Date de publication: 2021-12-08
- Langue: Anglais
-
Reflecting the evolution of information and communication tools and technologies via synergizing theoretical and practical skills, Cybersecurity as a Fishing Game, conveys, concisely, the importance of cyber safety in regards to cybersecurity and the value of correct use....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process.
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Date de publication: 2023-10-10
- Langue: Anglais
-
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Digital Armor: Business Cyber Defense Strategies
- Defending the Digital Frontline: Cybersecurity Tactics for Businesses
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In the rapidly evolving digital age, cybersecurity has emerged as a cornerstone of business resilience and continuity. "The Digital Armor: Business Cyber Defense Strategies - Defending the Digital Frontline: Cybersecurity Tactics for Businesses" by Tom Brooks is a comprehensive guide designed to navigate the complex cybersecurity landscape facing today's organizations. This book offers a multi-faceted approach to fortify defenses, emphasizing the integration of technology, policy, and education to safeguard against the myriad cyber threats that businesses encounter.
-
The Digital Armor: Business Cyber Defense Strategies
- Defending the Digital Frontline: Cybersecurity Tactics for Businesses
- Narrateur(s): Tom Brooks
- Durée: 2 h et 22 min
- Date de publication: 2024-02-22
- Langue: Anglais
-
This audiobook offers a multi-faceted approach to fortify defenses, emphasizing the integration of technology, policy, and education to safeguard against the myriad cyber threats that businesses encounter.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2023-06-12
- Langue: Anglais
-
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Building a Career in Cybersecurity
- The Strategy and Skills You Need to Succeed
- Auteur(s): Yuri Diogenes
- Narrateur(s): Michael F. Walworth
- Durée: 4 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity is one of the world’s fastest growing, most exciting fields—but that doesn’t mean it’s easy to enter the industry and succeed. Now there’s a complete guide to creating a great cybersecurity career, whether you’re migrating to cybersecurity from another field or already a cybersecurity professional.
-
Building a Career in Cybersecurity
- The Strategy and Skills You Need to Succeed
- Narrateur(s): Michael F. Walworth
- Durée: 4 h et 15 min
- Date de publication: 2023-11-16
- Langue: Anglais
-
Cybersecurity is one of the world’s fastest growing, most exciting fields—but that doesn’t mean it’s easy to enter the industry and succeed....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Hacking & Open Source
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does how hackers never seem to get caught interest you? Purchase Hacking to discover everything you need to know about hacking. Learn step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one purchase!
-
Hacking & Open Source
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 3 min
- Date de publication: 2016-03-29
- Langue: Anglais
- Learn step by step how to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge is here in one download....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,10$ ou 1 crédit
Prix réduit: 20,10$ ou 1 crédit
-
-
-
Hacking & Malware
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does how hackers never seem to get caught interest you? Purchase Hacking to discover everything you need to know about hacking. Learn step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one purchase!
-
Hacking & Malware
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 3 min
- Date de publication: 2016-03-30
- Langue: Anglais
- Is hacking what you want to learn? Always wondered how one becomes a hacker? Purchase Hacking to discover everything you need to know....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,10$ ou 1 crédit
Prix réduit: 20,10$ ou 1 crédit
-