Computer Security
-
-
Parenting for the Digital Age
- The Truth behind Media's Effect on Children and What to Do about It
- Auteur(s): Bill Ratner
- Narrateur(s): Bill Ratner
- Durée: 4 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
From how to deal with cyberbullying to the strange, true stories behind Barbie and G.I. Joe, media insider Bill Ratner takes an inside look at our wired-up world in a fascinating book - part memoir, part parenting guide - for the digital age. Landing his first job in advertising at age fourteen, Ratner learned early that the media doesn't necessarily have our best interests at heart.
-
Parenting for the Digital Age
- The Truth behind Media's Effect on Children and What to Do about It
- Narrateur(s): Bill Ratner
- Durée: 4 h et 47 min
- Date de publication: 2014-12-09
- Langue: Anglais
- From how to deal with cyberbullying to the strange, true stories behind Barbie and G.I. Joe, media insider Bill Ratner takes an inside look at our wired-up world in a fascinating book....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The Blockchain Innovator's Handbook
- A Leader's Guide to Understanding, Adopting and Succeeding with This Disruptive Technology
- Auteur(s): Conor Svensson
- Narrateur(s): Conor Svensson, Leyla Hart-Svensson, Raoul Pal
- Durée: 4 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you struggling to understand what blockchain technology does and how it can benefit your business? "The Blockchain Innovator's Handbook" is an accessible guide for leaders. It covers everything from opportunity identification to implementation and shows how to unlock new business opportunities in a fast-changing environment.
-
The Blockchain Innovator's Handbook
- A Leader's Guide to Understanding, Adopting and Succeeding with This Disruptive Technology
- Narrateur(s): Conor Svensson, Leyla Hart-Svensson, Raoul Pal
- Durée: 4 h et 49 min
- Date de publication: 2023-03-29
- Langue: Anglais
-
Are you struggling to understand what blockchain technology does and how it can benefit your business? "The Blockchain Innovator's Handbook" is an...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,97$ ou 1 crédit
Prix réduit: 20,97$ ou 1 crédit
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software used throughout government and critical infrastructure. Several policies and working groups at multiple levels within the U.S. Government focus on this need to ensure the authenticity, integrity, and trustworthiness of software products.
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Date de publication: 2024-01-11
- Langue: Anglais
-
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Continuous Security Testing and Monitoring for the Enterprise
- Auteur(s): Leon Yen
- Narrateur(s): Leon Yen
- Durée: 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Vigilant organizations in recent years have been boosting their security measures in response to both increasing cybercrime and heightened control requirements from regulatory bodies. Learn more about continuous security testing and monitoring and how it can help bolster your organization's security posture.
-
Continuous Security Testing and Monitoring for the Enterprise
- Narrateur(s): Leon Yen
- Durée: 15 min
- Date de publication: 2015-11-10
- Langue: Anglais
- Vigilant organizations in recent years have been boosting their security measures in response to both increasing cybercrime and heightened control requirements....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 5,31$ ou 1 crédit
Prix réduit: 5,31$ ou 1 crédit
-
-
-
CISA Cybersecurity Strategic Plan FY2024-2026
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Malicious cyber actors recognize our dependence on technology and constantly attempt to exploit this reliance for financial or strategic gain. Too often, they succeed. Their success is enabled by an environment of insecurity, in which our enterprises are too difficult to defend, and our technology products are too vulnerable to protect.
-
CISA Cybersecurity Strategic Plan FY2024-2026
- Narrateur(s): Tom Brooks
- Durée: 2 h et 37 min
- Date de publication: 2023-09-28
- Langue: Anglais
-
Malicious cyber actors recognize our dependence on technology and constantly attempt to exploit this reliance for financial or strategic gain. Too often, they succeed....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Evaluation of the CPSC’s NIST Cybersecurity Framework Implementation
- Auteur(s): U.S. Consumer Product Safety Commission
- Narrateur(s): Tom Brooks
- Durée: 1 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This report evaluates the US Consumer Product Safety Commission’s (CPSC) progress in implementing the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity (CSF). The CSF provides guidelines for organizations to evaluate and improve an agency’s cybersecurity posture. This approach requires management to consider cybersecurity risks as part of the organization’s overall risk management assessment, specifically with a focus on an agency’s cybersecurity risk.
-
Evaluation of the CPSC’s NIST Cybersecurity Framework Implementation
- Narrateur(s): Tom Brooks
- Durée: 1 h et 23 min
- Date de publication: 2022-02-14
- Langue: Anglais
-
This report evaluates the US Consumer Product Safety Commission’s progress in implementing the National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (CSF). The CSF provides guidelines to evaluate an agency’s cybersecurity posture....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The World of Cybersecurity
- Everything You Need to Know About It
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 1 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
When it comes to keeping your own personal safety, you may be getting bombarded with articles and marketing agents trying to pull you towards their firms; you need to make sure that you are equipped with the correct information before you set out on the journey to protect yourself, and your personal information forms the dangers around you. Before you dive into the market and the complexities of cybersecurity, it’s highly important that you know what you’re getting into; this book promises to guide you through it all!
-
The World of Cybersecurity
- Everything You Need to Know About It
- Narrateur(s): Tom Brooks
- Durée: 1 h et 31 min
- Date de publication: 2021-05-28
- Langue: Anglais
-
Before you dive into the market and the complexities of cybersecurity, it’s highly important that you know what you’re getting into; this book promises to guide you through it all! Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Malware Detection & Threats Made Easy!
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 1 h et 24 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is malware what you want to learn? Always wondered how malware works? Does it interest you how viruses compromise your computer? Listen to this book to discover everything you need to know about tech threats. Learn step by step how to increase your malware skill set. Learn how to detect threats on your computer systems. All the basic knowledge you need is here!
-
Malware Detection & Threats Made Easy!
- Narrateur(s): Millian Quinteros
- Durée: 1 h et 24 min
- Date de publication: 2016-02-22
- Langue: Anglais
- Learn step by step how to increase your malware skill set. Learn how to detect threats on your computer systems. All the basic knowledge you need is here!...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- Auteur(s): Jonathan Rigdon
- Narrateur(s): Kevin Brooker
- Durée: 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- Narrateur(s): Kevin Brooker
- Durée: 51 min
- Date de publication: 2024-06-25
- Langue: Anglais
-
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
The CISA Tips On: Guide to Securing Remote Access Software
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Remote access software and tools comprise a broad array of capabilities used to maintain and improve IT, operational technology (OT), and industrial control systems (ICS) services; they allow a proactive and flexible approach for organizations to remotely oversee networks, computers, and other devices.
-
The CISA Tips On: Guide to Securing Remote Access Software
- Narrateur(s): Tom Brooks
- Durée: 1 h et 53 min
- Date de publication: 2023-06-22
- Langue: Anglais
-
Remote access software and tools comprise a broad array of capabilities used to maintain and improve IT, operational technology (OT), and industrial control systems (ICS) services....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Invisibility Toolkit
- 100 Ways to Disappear and How to Be Anonymous From Oppressive Governments, Stalkers & Criminals
- Auteur(s): Lance Henderson
- Narrateur(s): James C. Lewis
- Durée: 2 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Your sovereignty is under attack. You don't need the red pill to see it because you've already been unplugged. It's all around you. Within this audiobook lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever.
-
Invisibility Toolkit
- 100 Ways to Disappear and How to Be Anonymous From Oppressive Governments, Stalkers & Criminals
- Narrateur(s): James C. Lewis
- Durée: 2 h et 28 min
- Date de publication: 2015-10-02
- Langue: Anglais
- Within this audiobook lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34$ ou 1 crédit
Prix réduit: 9,34$ ou 1 crédit
-
-
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process.
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Date de publication: 2023-10-10
- Langue: Anglais
-
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Auteur(s): L.D. Knowings
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover everything you need to know about hacking. Step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one download! You need to get it now to know what's inside, as it can't be shared here!
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Date de publication: 2015-12-21
- Langue: Anglais
- Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34$ ou 1 crédit
Prix réduit: 9,34$ ou 1 crédit
-
-
-
Internet Security
- Online Protection from Computer Hacking
- Auteur(s): James Cloud
- Narrateur(s): Graham King
- Durée: 1 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you being robbed in your own home and don't even know it? Are you being conned out of your own passwords and account numbers without your knowledge? Are your children safe from predicators when you allow them to be on the computer unsupervised? Do you know how to protect yourself? So what the heck are digital footprints and cookies? Or spam, malware, and phishing? This is a basic guide for the average computer user on how to protect themselves online.
-
Internet Security
- Online Protection from Computer Hacking
- Narrateur(s): Graham King
- Durée: 1 h et 38 min
- Date de publication: 2016-12-23
- Langue: Anglais
- This is a basic guide for the average computer user on how to protect themselves online....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
Jump-Start Your SOC Analyst Career
- A Roadmap to Cybersecurity Success
- Auteur(s): Tyler Wall, Jarrett Rodrick
- Narrateur(s): Stu Summers
- Durée: 4 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book. Authors Tyler E. Wall and Jarrett W. Rodrick carefully and expertly share real-world insights and practical tips in Jump-start Your SOC Analyst Career. The lessons revealed equip you for interview preparation, tackling day one on the job, and setting long-term development goals.
-
Jump-Start Your SOC Analyst Career
- A Roadmap to Cybersecurity Success
- Narrateur(s): Stu Summers
- Durée: 4 h et 59 min
- Date de publication: 2024-08-07
- Langue: Anglais
-
A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- Auteur(s): Dana Onyshko
- Narrateur(s): Gary Westphalen, Jon Bratton
- Durée: 5 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management. Do you feel that cyber security is indispensable in todays digital-dependent world? Do you want to introduce yourself to the world of cyber security but are easily overwhelmed or not sure where to start? Are you concerned about your own digital devices and networks, do you suspect they may be hacked or reporting information about your daily habits to unknown databases?
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- Narrateur(s): Gary Westphalen, Jon Bratton
- Durée: 5 h et 40 min
- Date de publication: 2024-04-19
- Langue: Anglais
-
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments. From concepts to advanced techniques, this book offers a structured and accessible approach to understanding the nuances of cloud security.
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 19 min
- Date de publication: 2024-04-16
- Langue: Anglais
-
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Computer Science 2.0 Beginners Crash Course
- Python, Javascript, Cyber Security, and Algorithms
- Auteur(s): Ian Batantu
- Narrateur(s): Brynn Fleming
- Durée: 3 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The first time I used a computer, it intrigued me to know how these interfaces work. In this audiobook, you’ll learn the same way I did.
-
Computer Science 2.0 Beginners Crash Course
- Python, Javascript, Cyber Security, and Algorithms
- Narrateur(s): Brynn Fleming
- Durée: 3 h et 18 min
- Date de publication: 2023-02-07
- Langue: Anglais
-
The first time I used a computer, it intrigued me to know how these interfaces work. In this audiobook, you’ll learn the same way I did....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-