Computer Security
-
-
The CISO Guide to Zero Trust Security
- Auteur(s): Raj Badhwar
- Narrateur(s): Michelle Badhwar
- Durée: 6 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Zero Trust Security framework provides essential security controls to remediate and mitigate advanced cyber threats from compromising our applications and systems. The leaders of our nation, and the business and technology leaders of our firms, have put in a call to arms for CISOs and other security professionals to lead this effort to secure our systems and applications from cyber-attackers.
-
The CISO Guide to Zero Trust Security
- Narrateur(s): Michelle Badhwar
- Durée: 6 h et 41 min
- Date de publication: 2022-08-12
- Langue: Anglais
-
The Zero Trust Security framework provides essential security controls to remediate and mitigate advanced cyber threats from compromising our applications and systems....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Auteur(s): Heidi Boghosian
- Narrateur(s): Charles Hubble
- Durée: 7 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities. Attorney and data privacy expert Heidi Boghosian unpacks widespread myths around the seemingly innocuous nature of surveillance, sets the record straight about what government agencies and corporations do with our personal data, and offers solutions to take back our information.
-
"I Have Nothing to Hide"
- And 20 Other Myths About Surveillance and Privacy
- Narrateur(s): Charles Hubble
- Série: Myths Made in America
- Durée: 7 h et 27 min
- Date de publication: 2021-07-13
- Langue: Anglais
-
An accessible guide that breaks down the complex issues around mass surveillance and data privacy and explores the negative consequences it can have on individual citizens and their communities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 23,31$ ou 1 crédit
Prix réduit: 23,31$ ou 1 crédit
-
-
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Auteur(s): Shashi Shekhar, Pamela Vold
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Billions of people around the globe use various applications of spatial computing daily - by using a ride-sharing app, GPS, social media check-ins, even Pokemon Go. Scientists and researchers use spatial computing to track diseases, map the bottom of the oceans, chart the behavior of endangered species, and create election maps in real time. Drones and driverless cars use a variety of spatial computing technologies. Spatial computing works by understanding the physical world, knowing and communicating our relation to places in that world, and navigating through those places.
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Date de publication: 2020-06-02
- Langue: Anglais
-
Billions of people around the globe use various applications of spatial computing daily-by using a ride-sharing app, GPS, the e911 system, social media check-ins, even Pokemon Go....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Auteur(s): Garrett Sutton Esq., Robert T. Kiyosaki - foreword
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Deceptive misinformation comes at us for many reasons. A key one is to steal our assets. We are free to communicate and stay connected in many ways. This great benefit, however, is now abused by criminal elements to take and defraud, bringing shame on trusting souls. The wreckage wrought by cyber criminality is not only financial but highly emotional. Lives are lost to depression and suicide. Don’t let this happen to you or your family. Scam Proof Your Assets: Guarding Against Widespread Deception gives you the tools and context for protecting yourself.
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Date de publication: 2021-05-03
- Langue: Anglais
-
Scam Proof Your Assets gives you the tools and context for protecting yourself. Unlike other sources, Scam Proof Your Assets teaches you the patterns to look for, including greed and fear, "expert" positioning and charm as manipulation....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 28,27$ ou 1 crédit
Prix réduit: 28,27$ ou 1 crédit
-
-
-
You CAN Stop Stupid
- Stopping Losses from Accidental and Malicious Actions
- Auteur(s): Ira Winkler, Dr. Tracy Celaya Brown
- Narrateur(s): Chris Sorensen
- Durée: 14 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, Ira Winkler and Dr. Tracy Celaya's You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement.
-
You CAN Stop Stupid
- Stopping Losses from Accidental and Malicious Actions
- Narrateur(s): Chris Sorensen
- Durée: 14 h et 44 min
- Date de publication: 2021-01-26
- Langue: Anglais
-
Ira Winkler and Dr. Tracy Celaya's You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Zero Trust Architecture
- Networking Technology: Security
- Auteur(s): Cindy Green-Ortiz, Brandon Fowler, David Houck, Autres
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Zero Trust Architecture
- Networking Technology: Security
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Date de publication: 2024-04-11
- Langue: Anglais
-
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,27$ ou 1 crédit
Prix réduit: 31,27$ ou 1 crédit
-
-
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Auteur(s): Alan T. Norman
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity. The audiobook concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks. Gain the ability to do ethical hacking and penetration testing by taking this hacking audiobook!
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Date de publication: 2019-10-03
- Langue: Anglais
-
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
CyberSecurity Metaverse
- Auteur(s): Sajed Khan
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds. There is a lot of marketing hype wrapped up in this idea of the metaverse, from Crypto, NFT, and Blockchain to digital wardrobes. To help you get a sense of how vague and complex a term the "metaverse" can be, this audiobook is written around the parameters of what the metaverse means but more importantly cybersecurity.
-
CyberSecurity Metaverse
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- Auteur(s): Abraham K White
- Narrateur(s): Dalan E Decker
- Durée: 5 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking.
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- Narrateur(s): Dalan E Decker
- Durée: 5 h et 49 min
- Date de publication: 2018-04-26
- Langue: Anglais
-
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Auteur(s): Jeffrey Caruso
- Narrateur(s): Mike Lenz
- Durée: 5 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Narrateur(s): Mike Lenz
- Durée: 5 h et 30 min
- Date de publication: 2025-04-29
- Langue: Anglais
-
Cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 14,02$ ou 1 crédit
Prix réduit: 14,02$ ou 1 crédit
-
-
-
Term Life
- A Novel of Love, Death, and Computer Security
- Auteur(s): William H. Boyd
- Narrateur(s): Gregg Rizzo
- Durée: 10 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Gus Bishop lives in a trendy downtown Austin condo. He works in computer security for a high tech Austin tech company and drives a high performance car. Yet, something is missing. Every woman he wants eludes him, and his company is under the threat of being hacked. But after an internet search, Gus meets a strange man who represents a unique insurance company - this company insures its clients, not from death, but from a life that is no longer worth living.
-
Term Life
- A Novel of Love, Death, and Computer Security
- Narrateur(s): Gregg Rizzo
- Durée: 10 h et 50 min
- Date de publication: 2017-11-14
- Langue: Anglais
-
Gus Bishop lives in a trendy downtown Austin condo. He works in computer security for a high tech Austin tech company and drives a high performance car. Yet, something is missing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
Is Cyber Deterrence Possible?
- Auteur(s): US Department of Defense
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In recent years, the importance of operating in and protecting the cyber domain has gained much attention. As long as our nation relies on computer networks as a foundation for military and economic power, our national and economic security are at risk through the cyber domain. Cyber attacks on US industry and government systems severely impact our economy and ability to execute modern, network-centric warfare.
-
Is Cyber Deterrence Possible?
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Date de publication: 2021-04-10
- Langue: Anglais
-
In recent years, the importance of operating in and protecting the cyber domain has gained much attention. As long as our nation relies on computer networks as a foundation for military and economic power, our national and economic security are at risk through the cyber domain....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
We Have Root
- Even More Advice from Schneier on Security
- Auteur(s): Bruce Schneier
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments.
-
We Have Root
- Even More Advice from Schneier on Security
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Date de publication: 2019-11-08
- Langue: Anglais
-
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Security Awareness for Dummies
- Auteur(s): Ira Winkler CISSP
- Narrateur(s): Tristan Morris
- Durée: 9 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness for Dummies gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization.
-
Security Awareness for Dummies
- Narrateur(s): Tristan Morris
- Durée: 9 h et 16 min
- Date de publication: 2022-05-24
- Langue: Anglais
-
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- Auteur(s): Kim Crawley
- Narrateur(s): Jo Anna Perrin
- Durée: 7 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical road map to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- Narrateur(s): Jo Anna Perrin
- Durée: 7 h et 49 min
- Date de publication: 2021-10-26
- Langue: Anglais
-
Harden your business against internal and external cybersecurity threats with a single accessible resource....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
The Security Consultant’s Handbook
- Auteur(s): Richard Bingley
- Narrateur(s): Malk Williams
- Durée: 14 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A compendium of essential information for the modern security entrepreneur and practitioner. This audiobook provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel they are underappreciated and overexerted in traditional business domains.
-
-
material outdated, this book is from 4 to 5 years
- Écrit par Utilisateur anonyme le 2019-02-04
-
The Security Consultant’s Handbook
- Narrateur(s): Malk Williams
- Durée: 14 h et 32 min
- Date de publication: 2018-12-28
- Langue: Anglais
-
A compendium of essential information for the modern security entrepreneur and practitioner.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Date de publication: 2021-01-14
- Langue: Anglais
-
The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Hacking: The Complete Beginner’s Guide to Computer Hacking
- Auteur(s): Jack Jones
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you know a little something about hacking but want to know more? Do you want to learn how to get past the information-gathering stage and how you can actually start accessing systems? Are you interested in learning how to make money hacking without actually breaking the law? This book is going to go through all these concepts and a whole lot more. We will teach you how to start off in a career as a professional, ethical hacker - actually improving the security of systems online rather than destroying them.
-
Hacking: The Complete Beginner’s Guide to Computer Hacking
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 4 min
- Date de publication: 2017-12-01
- Langue: Anglais
-
We'll teach you how to access the system, where to find exploits, what you need to know about programming and tools that will make your life so much easier. Start looking for vulnerabilities....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Spy Who Couldn't Spell
- A Dyslexic Traitor, an Unbreakable Code, and the FBI's Hunt for America's Stolen Secrets
- Auteur(s): Yudhijit Bhattacharjee
- Narrateur(s): Robert Fass
- Durée: 8 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Before Edward Snowden's infamous data breach, the largest theft of government secrets was committed by an ingenious traitor whose intricate espionage scheme and complex system of coded messages were made even more baffling by his dyslexia. His name is Brian Regan, but he came to be known as the Spy Who Couldn't Spell.
-
The Spy Who Couldn't Spell
- A Dyslexic Traitor, an Unbreakable Code, and the FBI's Hunt for America's Stolen Secrets
- Narrateur(s): Robert Fass
- Durée: 8 h et 11 min
- Date de publication: 2016-11-01
- Langue: Anglais
- The largest theft of government secrets was committed by a traitor whose espionage scheme and complex system of coded messages were made even more baffling by his dyslexia....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,22$ ou 1 crédit
Prix réduit: 26,22$ ou 1 crédit
-
-
-
The Code of Honor
- Embracing Ethics in Cybersecurity
- Auteur(s): Paul J. Maurer, Ed Skoudis
- Narrateur(s): Rick Adamson
- Durée: 5 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, president of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, president of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world.
-
The Code of Honor
- Embracing Ethics in Cybersecurity
- Narrateur(s): Rick Adamson
- Durée: 5 h et 42 min
- Date de publication: 2024-08-13
- Langue: Anglais
-
While some professions-including medicine, law, and engineering-have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-