Computer Security
-
-
Cybersecurity Unlocked!
- Strategies to Outsmart Hackers, and Online Criminals
- Auteur(s): Miles Lockhart
- Narrateur(s): Lloyd V Dennis
- Durée: 5 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Go from cyber-insecure to cyber-savvy—outsmart cyber thieves with this comprehensive guide to a safe, fulfilling online experience—even if online safety is uncharted territory for you! Just 10 years ago, few people could probably envision a world where they could shop with their mobile phone, effortlessly connect their home and work computers, or access literally millions of apps with just one click. The upside of ubiquitous connectivity? Speed, practicality, efficiency. The downside? Data has become gold, and our “treasure” is sadly all too accessible to clever hackers and data thieves.
-
Cybersecurity Unlocked!
- Strategies to Outsmart Hackers, and Online Criminals
- Narrateur(s): Lloyd V Dennis
- Durée: 5 h et 5 min
- Date de publication: 2025-01-13
- Langue: Anglais
-
Go from cyber-insecure to cyber-savvy—outsmart cyber thieves with this comprehensive guide to a safe, fulfilling online experience—even if online safety is uncharted territory for you!
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
The People vs Tech
- How the Internet Is Killing Democracy (and How We Save It)
- Auteur(s): Jamie Bartlett
- Narrateur(s): Sandro Monetti
- Durée: 5 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Internet was meant to set us free. But have we unwittingly handed too much away to shadowy powers behind a wall of code, all manipulated by a handful of Silicon Valley utopians, ad men, and venture capitalists? And, in light of recent data breach scandals around companies like Facebook and Cambridge Analytica, what does that mean for democracy, our delicately balanced system of government that was created long before big data, total information, and artificial intelligence? In this urgent polemic, Jamie Bartlett argues that through our unquestioning embrace of big tech, the building blocks of democracy are slowly being removed.
-
-
Doesn't load. This book won't play on my device at
- Écrit par Utilisateur anonyme le 2018-08-02
-
The People vs Tech
- How the Internet Is Killing Democracy (and How We Save It)
- Narrateur(s): Sandro Monetti
- Durée: 5 h et 5 min
- Date de publication: 2018-04-06
- Langue: Anglais
-
The Internet was meant to set us free. But have we unwittingly handed too much away to shadowy powers behind a wall of code, all manipulated by a handful of Silicon Valley utopians, ad men, and venture capitalists? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,48 $ ou 1 crédit
Prix réduit: 17,48 $ ou 1 crédit
-
-
-
The Cyber Security Survival Guide
- GRIPIT: Get Real Identity Theft Protection, Information & Technology
- Auteur(s): J.K. Ripley
- Narrateur(s): Tom Brooks
- Durée: 4 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book eliminates intimidation with clear, jargon-free guidance and practical steps to keep you and your loved ones safe online. It’s never too late to take control of your digital security.
-
The Cyber Security Survival Guide
- GRIPIT: Get Real Identity Theft Protection, Information & Technology
- Narrateur(s): Tom Brooks
- Durée: 4 h et 16 min
- Date de publication: 2025-01-06
- Langue: Anglais
-
This book eliminates intimidation with clear, jargon-free guidance and practical steps to keep you and your loved ones safe online. It’s never too late to take control of your digital security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
The Cyber War Is Here
- U.S. and Global Infrastructure Under Attack: A CISO’s Perspective
- Auteur(s): Marc Crudgington
- Narrateur(s): Robert Plank
- Durée: 5 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
"The Cyber War Is Here" simplifies the complex world of cybersecurity, cyber risk, and the crucial relationship between corporate boards and Chief Information Security Officers (CISOs). Written by a distinguished cybersecurity expert and USAF Veteran, it emphasizes the strategic importance of cybersecurity in modern business. Marc highlights the evolving role of CISOs, emphasizing their shift from IT guardians to strategic advisors to the board. The book explores successful board-CISO interactions and the consequences of misalignment, offering a clear blueprint for effective partnership.
-
The Cyber War Is Here
- U.S. and Global Infrastructure Under Attack: A CISO’s Perspective
- Narrateur(s): Robert Plank
- Durée: 5 h et 50 min
- Date de publication: 2024-10-22
- Langue: Anglais
-
"The Cyber War Is Here" simplifies the complex world of cybersecurity, cyber risk, and the crucial relationship between corporate boards and Chief Information Security Officers (CISOs).
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Cryptography
- Auteur(s): Panos Louridas
- Narrateur(s): Tom Beyer
- Durée: 6 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets.
-
Cryptography
- Narrateur(s): Tom Beyer
- Durée: 6 h et 30 min
- Date de publication: 2024-10-22
- Langue: Anglais
-
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92 $ ou 1 crédit
Prix réduit: 21,92 $ ou 1 crédit
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Auteur(s): Jeffrey Caruso
- Narrateur(s): Mike Lenz
- Durée: 4 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Narrateur(s): Mike Lenz
- Durée: 4 h et 41 min
- Date de publication: 2025-04-29
- Langue: Anglais
-
Cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 14,02 $ ou 1 crédit
Prix réduit: 14,02 $ ou 1 crédit
-
-
-
Cybersecurity for Beginners
- Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams
- Auteur(s): Michael Patel
- Narrateur(s): Kevin Elliott
- Durée: 5 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With cybersecurity becoming a necessity, Cybersecurity for Beginners offers a clear and actionable guide for safeguarding your personal and professional data. Whether you're preparing for the CompTIA Security+ certification or simply want to understand how to defend against malware and phishing, this book gives you the tools you need to stay safe in the digital world.
-
Cybersecurity for Beginners
- Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams
- Narrateur(s): Kevin Elliott
- Durée: 5 h et 3 min
- Date de publication: 2025-01-13
- Langue: Anglais
-
With cybersecurity becoming a necessity, Cybersecurity for Beginners offers a clear and actionable guide for safeguarding your personal and professional data.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 1 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- Narrateur(s): Frank Block
- Série: NIST 800 Cybersecurity, Livre 1
- Durée: 1 h et 32 min
- Date de publication: 2022-06-22
- Langue: Anglais
-
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $ ou 1 crédit
Prix réduit: 8,71 $ ou 1 crédit
-
-
-
NFT for Beginners
- An Essential Guide to Understanding and Investing in Non-fungible Tokens and Crypto Art
- Auteur(s): Donn Newman
- Narrateur(s): Eric Burr
- Durée: 3 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you’re confused about the recent surge of crypto art and want to learn more about NFTs and their market, look no further! Have you ever wondered what the deal is with crypto art? Ever heard the term NFT and wondered what that could possibly mean? Do you feel intimidated by this new technology, more so because you’re barely struggling to understand Bitcoin and Ethereum? Are you a creative person looking to get into the crypto art scene? Then this audiobook is just what you need.
-
NFT for Beginners
- An Essential Guide to Understanding and Investing in Non-fungible Tokens and Crypto Art
- Narrateur(s): Eric Burr
- Durée: 3 h et 42 min
- Date de publication: 2022-05-17
- Langue: Anglais
-
If you’re confused about the recent surge of crypto art and want to learn more about NFTs and their market, look no further! Have you ever wondered what the deal is with crypto art? Ever heard the term NFT and wondered what that could possibly mean? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 15,10 $ ou 1 crédit
Prix réduit: 15,10 $ ou 1 crédit
-
-
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): Chris Pace
- Durée: 2 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- Narrateur(s): Chris Pace
- Durée: 2 h et 37 min
- Date de publication: 2019-01-15
- Langue: Anglais
-
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $ ou 1 crédit
Prix réduit: 8,71 $ ou 1 crédit
-
-
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- Auteur(s): Jonathan Rigdon
- Narrateur(s): Kevin Brooker
- Durée: 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies. This includes implementing robust firewalls and intrusion detection systems to monitor and control network traffic, deploying antivirus software to detect and remove malicious software, using encryption to secure sensitive data both in transit and at rest, and implementing strong authentication mechanisms such as multi-factor authentication to prevent unauthorized access.
-
Cyber Security
- Beginners’ Guide to Hacking, Phishing, Social Engineering, and Malware
- Narrateur(s): Kevin Brooker
- Durée: 51 min
- Date de publication: 2024-06-25
- Langue: Anglais
-
To effectively defend against the threats, cybersecurity professionals employ a variety of strategies and technologies.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 3,02 $ ou 1 crédit
Prix réduit: 3,02 $ ou 1 crédit
-
-
-
Step-by-Step Cyber Security for Beginners
- A Practical Guide to Understanding Threats. Protecting Yourself and Your Devices in the Digital Age
- Auteur(s): Ethan Ward
- Narrateur(s): Aaron Sinn
- Durée: 4 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In simple and easy-to-understand language, this book provides you with the knowledge and tools to recognize and counteract cyber threats, helping you navigate the digital world with confidence and security.
-
Step-by-Step Cyber Security for Beginners
- A Practical Guide to Understanding Threats. Protecting Yourself and Your Devices in the Digital Age
- Narrateur(s): Aaron Sinn
- Durée: 4 h et 34 min
- Date de publication: 2024-12-12
- Langue: Anglais
-
In simple and easy-to-understand language, this book provides you with the knowledge and tools to recognize and counteract cyber threats, helping you navigate the digital world with confidence and security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 15,10 $ ou 1 crédit
Prix réduit: 15,10 $ ou 1 crédit
-
-
-
Power to the People
- How Open Technological Innovation is Arming Tomorrow's Terrorists
- Auteur(s): Audrey Kurth Cronin
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As Audrey Kurth Cronin explains in Power to the People, what we are seeing now is an exacerbation of an age-old trend. Over the centuries, the most surprising developments in warfare have occurred because of advances in technologies combined with changes in who can use them. Indeed, accessible innovations in destructive force have long driven new patterns of political violence. When Nobel invented dynamite and Kalashnikov designed the AK-47, each inadvertently spurred terrorist and insurgent movements that killed millions and upended the international system.
-
Power to the People
- How Open Technological Innovation is Arming Tomorrow's Terrorists
- Narrateur(s): Teri Schnaubelt
- Durée: 12 h et 40 min
- Date de publication: 2020-03-10
- Langue: Anglais
-
Never have so many possessed the means to be so lethal. The diffusion of modern technology to ordinary people has given them access to weapons of mass violence previously monopolized by the state....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83 $ ou 1 crédit
Prix réduit: 27,83 $ ou 1 crédit
-
-
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Auteur(s): Jack Jones
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
What do you know about hacking a computer system? If you are like most of us, you can't even get into your own computer if you've forgotten the password. The good news is that hacking is actually a lot easier than you think, and anyone can learn how to do it. As long as you are willing to do the work and to work through the steps patiently, you will also be able to hack the systems that you want to.
-
Hacking: The Complete Beginner's Guide to Computer Hacking
- How to Hack Networks and Computer Systems, Information Gathering, Password Cracking
- Narrateur(s): Graeme Daniels
- Durée: 1 h et 7 min
- Date de publication: 2017-09-25
- Langue: Anglais
- If you are like most of us, you can't even get into your own computer if you've forgotten the password....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34 $ ou 1 crédit
Prix réduit: 9,34 $ ou 1 crédit
-
-
-
Jump-Start Your SOC Analyst Career
- A Roadmap to Cybersecurity Success
- Auteur(s): Tyler Wall, Jarrett Rodrick
- Narrateur(s): Stu Summers
- Durée: 4 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book. Authors Tyler E. Wall and Jarrett W. Rodrick carefully and expertly share real-world insights and practical tips in Jump-start Your SOC Analyst Career. The lessons revealed equip you for interview preparation, tackling day one on the job, and setting long-term development goals.
-
Jump-Start Your SOC Analyst Career
- A Roadmap to Cybersecurity Success
- Narrateur(s): Stu Summers
- Durée: 4 h et 59 min
- Date de publication: 2024-08-07
- Langue: Anglais
-
A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 3 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
All organizations face a broad array of risks, including cybersecurity risk. For federal agencies, the Office of Management and Budget (OMB) Circular A-11 defines risk as “the effect of uncertainty on objectives”. An organization’s mission and business objectives can be impacted by such effects, and must be managed at various levels within the organization. This report highlights aspects of cybersecurity risk management (CSRM) inherent to enterprises, organizations, and systems.
-
Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management
- Narrateur(s): Tom Brooks
- Durée: 3 h et 29 min
- Date de publication: 2021-12-01
- Langue: Anglais
-
All organizations face a broad array of risks, including cybersecurity risk. For federal agencies, the Office of Management and Budget (OMB) Circular A-11 defines risk as “the effect of uncertainty on objectives”. An organization’s mission and business objectives can be impacted....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Auteur(s): David Senecal
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves. The author uses plain language to lift the veil on bots and fraud, making a topic critical to your website's security easy to understand and even easier to implement.
-
The Reign of Botnets
- Defending Against Abuses, Bots and Fraud on the Internet
- Narrateur(s): Bob Johnson
- Durée: 8 h et 44 min
- Date de publication: 2024-08-27
- Langue: Anglais
-
In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83 $ ou 1 crédit
Prix réduit: 27,83 $ ou 1 crédit
-
-
-
Inside Cyber
- How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security
- Auteur(s): Chuck Brooks
- Narrateur(s): Ray Greenley
- Durée: 6 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security emerges as a critical roadmap for understanding and leveraging the next wave of tech advancements. Chuck Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.
-
Inside Cyber
- How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security
- Narrateur(s): Ray Greenley
- Durée: 6 h et 27 min
- Date de publication: 2024-10-29
- Langue: Anglais
-
Chuck Brooks, a renowned executive and consultant, breaks down complex technological trends into digestible insights, offering a deep dive into how emerging technologies will shape the future of industry and society.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92 $ ou 1 crédit
Prix réduit: 21,92 $ ou 1 crédit
-
-
-
Money: Cryptocurrency
- Learn Trading, Investing, and Mining Blockchain Technology and Profit from Bitcoin, Ethereum and Ripple
- Auteur(s): George Hill, Napoleon S Clason
- Narrateur(s): John Ashton Nickerson
- Durée: 3 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Inside, you will learn everything you ever wanted to know about the technology that powers cryptocurrency. You will also learn how to choose the most promising contenders for the next big thing and not lose your shirt while taking advantage of the high degree of volatility the market is currently experiencing. If you want to learn more about cryptocurrencies and whether the opportunity is worth it, then this audiobook will definitely help you make an informed decision!
-
Money: Cryptocurrency
- Learn Trading, Investing, and Mining Blockchain Technology and Profit from Bitcoin, Ethereum and Ripple
- Narrateur(s): John Ashton Nickerson
- Durée: 3 h et 5 min
- Date de publication: 2018-11-29
- Langue: Anglais
-
You will learn everything you ever wanted to know about the technology powering cryptocurrency. You'll also learn how to choose the most promising contenders for the next big thing and not lose your shirt while taking advantage of the high degree of volatility the market is experiencing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-