Computer Security
-
-
Hacking: A Beginners Guide to Your First Computer Hack
- Learn to Crack a Wireless Network, Basic Security Penetration Made Easy and Step-by-Step Kali Linux
- Auteur(s): Kevin White
- Narrateur(s): Matt Montanez
- Durée: 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking will demand your full dedication and interest and also a desire and a craving for knowledge and constant advancement. If your goal is to be a hacker, this is the audiobook to start with! This audiobook contains proven steps and strategies on how to hack a wireless network, carry out a penetration test, and so much more. It gives an insight to the most used hacking techniques and how to develop your basic skills.
-
Hacking: A Beginners Guide to Your First Computer Hack
- Learn to Crack a Wireless Network, Basic Security Penetration Made Easy and Step-by-Step Kali Linux
- Narrateur(s): Matt Montanez
- Durée: 31 min
- Date de publication: 2018-02-26
- Langue: Anglais
-
This audiobook contains proven steps and strategies on how to hack a wireless network, carry out a penetration test, and so much more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
Evolving Electric Power Systems and Cybersecurity
- Auteur(s): Congressional Research Service
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging, and one of the tools for modernizing the system is the incorporation of computerized systems that allow for the rapid monitoring and control of the equipment used in the grid. Connecting these systems to the internet has increased the ability to remotely control aspects of the grid, but this has come with increasing concern for the grid’s cybersecurity.
-
Evolving Electric Power Systems and Cybersecurity
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Date de publication: 2021-11-29
- Langue: Anglais
-
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 1 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- Narrateur(s): Frank Block
- Série: NIST 800 Cybersecurity, Livre 1
- Durée: 1 h et 32 min
- Date de publication: 2022-06-22
- Langue: Anglais
-
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Date de publication: 2022-04-04
- Langue: Anglais
-
This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Auteur(s): L.D. Knowings
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department. As a tech professional, you spot anomalies that others might miss a slight misconfiguration here, a potential vulnerability there. You're not just an IT professional; you're the gatekeeper of your organization's cybersecurity.
-
Unlocking Security
- An Introduction to Ethical Hacking: A Comprehensive Handbook
- Narrateur(s): William Goldman
- Durée: 7 h et 9 min
- Date de publication: 2024-06-17
- Langue: Anglais
-
If you want to decode the world of ethical hacking, level up your IT expertise, and stay ahead of cyber threats, this guide is for you Picture yourself in the command center of your organization's IT department.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Digital Identity and Privacy
- Beginner’s Guide to the Technology that Governs Our Lives
- Auteur(s): Vadim Slavin
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h et 56 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In today's digital age, digital identity is an integral part of our lives. From online banking to social media, we use digital identities to access services, interact with others, and manage our daily lives. Because of this, we are becoming increasingly vulnerable to exploits targeting our online identity.
-
-
short & sweet
- Écrit par nil le 2023-05-29
-
Digital Identity and Privacy
- Beginner’s Guide to the Technology that Governs Our Lives
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h et 56 min
- Date de publication: 2023-04-24
- Langue: Anglais
-
In today's digital age, digital identity is an integral part of our lives. From online banking to social media, we use digital identities to access services, interact with others, and manage our daily lives....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Come and Take It
- The Gun Printer's Guide to Thinking Free
- Auteur(s): Cody Wilson
- Narrateur(s): Kirby Heyborne
- Durée: 7 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cody Wilson, a self-described crypto-anarchist and rogue thinker, combines the controversial yet thrilling story of the production of the first ever 3D printable gun with a startling philosophical manifesto that gets to the heart of the 21st-century debate over the freedom of information and ideas.
-
-
Not a very compelling tale, although interesting.
- Écrit par Amazon Customer le 2020-03-19
-
Come and Take It
- The Gun Printer's Guide to Thinking Free
- Narrateur(s): Kirby Heyborne
- Durée: 7 h et 51 min
- Date de publication: 2016-10-11
- Langue: Anglais
- Cody Wilson, a self-described crypto-anarchist and rogue thinker, combines the controversial yet thrilling story of the production of the first ever 3-D printable gun with a philosophical manifesto....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,99$ ou 1 crédit
Prix réduit: 19,99$ ou 1 crédit
-
-
-
Cybersecurity and Financial System Resilience Report
- Auteur(s): Board of Governors of the Federal Reserve System
- Narrateur(s): Tom Brooks
- Durée: 3 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Consolidated Appropriations Act, 20211 (CAA) requires the Board of Governors of the Federal Reserve System (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.
-
Cybersecurity and Financial System Resilience Report
- Narrateur(s): Tom Brooks
- Durée: 3 h et 2 min
- Date de publication: 2023-08-31
- Langue: Anglais
-
The Consolidated Appropriations Act, 20211 (CAA) requires the Board of Governors of the Federal Reserve System (Board) to submit annually for seven years a report focused on cybersecurity to Congress....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Hacking
- Fundamentals for Absolute Beginners
- Auteur(s): Alexander Bell
- Narrateur(s): Kevin Hung-Liang
- Durée: 3 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
For a beginner, hacking can seem like something scary or hard to do. Sometimes, we see movies and read the news on how systems such as Snapchat, eBay, or Google have been compromised and imagine that hacking is difficult. We think of it as something meant for people spending 24 hours a day in a basement, somewhere. This is not the case. This field is open for anyone.
-
Hacking
- Fundamentals for Absolute Beginners
- Narrateur(s): Kevin Hung-Liang
- Durée: 3 h et 8 min
- Date de publication: 2020-04-30
- Langue: Anglais
-
For a beginner, hacking can seem like something scary or hard to do. Sometimes, we see movies and read the news on how systems such as Snapchat, eBay, or Google have been compromised and imagine that hacking is difficult....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- Auteur(s): David James Carmack
- Narrateur(s): Ivan Busenius
- Durée: 3 h et 58 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- Narrateur(s): Ivan Busenius
- Durée: 3 h et 58 min
- Date de publication: 2020-03-09
- Langue: Anglais
-
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Auteur(s): Jack Jones
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
What do you know about hacking a computer system? If you are like most of us, you can't even get into your own computer if you've forgotten the password. The good news is that hacking is actually a lot easier than you think, and anyone can learn how to do it. As long as you are willing to do the work and to work through the steps patiently, you will also be able to hack the systems that you want to.
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Date de publication: 2017-09-25
- Langue: Anglais
- If you are like most of us, you can't even get into your own computer if you've forgotten the password....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34$ ou 1 crédit
Prix réduit: 9,34$ ou 1 crédit
-
-
-
Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 3 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
All organizations face a broad array of risks, including cybersecurity risk. For federal agencies, the Office of Management and Budget (OMB) Circular A-11 defines risk as “the effect of uncertainty on objectives”. An organization’s mission and business objectives can be impacted by such effects, and must be managed at various levels within the organization. This report highlights aspects of cybersecurity risk management (CSRM) inherent to enterprises, organizations, and systems.
-
Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management
- Narrateur(s): Tom Brooks
- Durée: 3 h et 29 min
- Date de publication: 2021-12-01
- Langue: Anglais
-
All organizations face a broad array of risks, including cybersecurity risk. For federal agencies, the Office of Management and Budget (OMB) Circular A-11 defines risk as “the effect of uncertainty on objectives”. An organization’s mission and business objectives can be impacted....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Auteur(s): Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Date de publication: 2024-05-21
- Langue: Anglais
-
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,30$ ou 1 crédit
Prix réduit: 26,30$ ou 1 crédit
-
-
-
Crypto Revolution
- The New Age of Wealth and Utility
- Auteur(s): Thomas Sparks
- Narrateur(s): Ted Ryan
- Durée: 1 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Rules in our traditional financial systems were once dictated by the powerful and the rich. However, this is all about to change. The crypto revolution is upon us, and it’s exponential rate of adoption is expected to lead humanity into a new age of wealth and utility. Unfortunately, blockchains and cryptocurrencies still remain to be among the most misunderstood technologies of the digital age.
-
Crypto Revolution
- The New Age of Wealth and Utility
- Narrateur(s): Ted Ryan
- Durée: 1 h et 18 min
- Date de publication: 2021-09-15
- Langue: Anglais
-
In this book, you will be learning all about what cryptocurrencies are, how they work, and how you can potentially capitalize on the growth of this new high-tech financial instrument to pursue both wealth acquisition and accumulation....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Auteur(s): Lester Evans
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you want to avoid getting hacked, having your information spread, and discover the world of ethical hacking then pay attention.... Two manuscripts in one audiobook: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyber-Warfare, Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber-Security of Computer Networks, Including Tips on Social Engineering.
-
-
An interesting read, not a guide or study manual
- Écrit par Joel C LaRusic le 2019-08-06
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Date de publication: 2019-02-07
- Langue: Anglais
-
How hackers use raunchy photos to eke out private information; examples of preposterous social engineering attacks; how there's only one surefire way to protect against hacking; how to lower your exposure to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Der Kampf um das Internet [The Battle for the Internet]
- Wie Wikipedia, Mastodon und Co. die Tech-Giganten herausfordern [How Wikipedia, Mastodon and Co. Are Challenging the Tech Giants]
- Auteur(s): Stefan Mey
- Narrateur(s): Heiko Grauel
- Durée: 7 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Mehr Freiheit und mehr Demokratie waren die großen Versprechen des Internets. Doch inzwischen konzentriert sich die Macht bei einigen wenigen Tech-Giganten. Dabei bietet das Netz selbst eine Lösung, um sein ursprüngliches Freiheitsversprechen zu bewahren: die nichtkommerzielle digitale Gegenwelt. Zu ihr zählen etwa die Online-Enzyklopädie Wikipedia, die Twitter-Alternative Mastodon, der nichtkommerzielle Browser Firefox oder der Messenger Signal.
-
Der Kampf um das Internet [The Battle for the Internet]
- Wie Wikipedia, Mastodon und Co. die Tech-Giganten herausfordern [How Wikipedia, Mastodon and Co. Are Challenging the Tech Giants]
- Narrateur(s): Heiko Grauel
- Durée: 7 h et 43 min
- Date de publication: 2023-11-23
- Langue: Allemand
-
Mehr Freiheit und mehr Demokratie waren die großen Versprechen des Internets. Doch inzwischen konzentriert sich die Macht bei einigen wenigen Tech-Giganten. Dabei bietet das Netz selbst eine Lösung, um sein ursprüngliches Freiheitsversprechen zu bewahren: die nichtkommerzielle digitale Gegenwelt....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,91$ ou 1 crédit
Prix réduit: 21,91$ ou 1 crédit
-
-
-
Web3 Social
- How Creators Are Changing the World Wide Web (and You Can Too!)
- Auteur(s): Allen Taylor
- Narrateur(s): Allen Taylor
- Durée: 7 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Web3 is emerging to expand the opportunities for creators by delivering tools that help them regain their content freedom, monetize their content better, safeguard their personal data, and fight back against censorship.
-
Web3 Social
- How Creators Are Changing the World Wide Web (and You Can Too!)
- Narrateur(s): Allen Taylor
- Durée: 7 h et 28 min
- Date de publication: 2023-05-18
- Langue: Anglais
-
Web3 is emerging to expand the opportunities for creators by delivering tools that help them regain their content freedom, monetize their content better, safeguard their personal data, and fight back against censorship....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
How to Stay Safe Online
- A Digital Self-Care Toolkit for Developing Resilience and Allyship
- Auteur(s): Seyi Akiwowo
- Narrateur(s): Seyi Akiwowo
- Durée: 7 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Digital spaces are a positive force for change, connection and community, but left unregulated, they are not always safe. Globally, women are 27 times more likely than men to be harassed online. 78 per cent of LGBTQ+ people have experienced hate crime and hate speech online and there has been a 71 per cent rise in online disability abuse. How to Stay Safe Online will teach you how to spot, respond to, and protect yourself from online abuse and learn how to be a good ally to those experiencing it.
-
How to Stay Safe Online
- A Digital Self-Care Toolkit for Developing Resilience and Allyship
- Narrateur(s): Seyi Akiwowo
- Durée: 7 h et 33 min
- Date de publication: 2022-08-25
- Langue: Anglais
-
Digital spaces are a positive force for change, connection and community, but left unregulated, they are not always safe. How to Stay Safe Online will teach you how to spot, respond to, and protect yourself from online abuse and learn how to be a good ally to those experiencing it....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,97$ ou 1 crédit
Prix réduit: 19,97$ ou 1 crédit
-
-
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- Auteur(s): Roger A. Grimes
- Narrateur(s): Ray Greenley
- Durée: 11 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.
-
-
I dash think dash you dash need dash links dash in download able dash pdf
- Écrit par Fedaykin Wolf le 2024-05-14
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- Narrateur(s): Ray Greenley
- Durée: 11 h et 43 min
- Date de publication: 2024-03-26
- Langue: Anglais
-
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
Our Data, Ourselves (First Edition)
- A Personal Guide to Digital Privacy
- Auteur(s): Jacqueline D. Lipton
- Narrateur(s): Corinne Davies
- Durée: 9 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides listeners through important issues involving technology, data collection, and digital privacy as they apply to our daily lives.
-
Our Data, Ourselves (First Edition)
- A Personal Guide to Digital Privacy
- Narrateur(s): Corinne Davies
- Durée: 9 h et 44 min
- Date de publication: 2022-11-22
- Langue: Anglais
-
A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-