Computer Security
-
-
Worm
- The First Digital World War
- Auteur(s): Mark Bowden
- Narrateur(s): Christopher Lane
- Durée: 7 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide. When Conficker was unleashed in November 2008, cybersecurity experts did not know what to make of it. Exploiting security flaws in Microsoft Windows, it grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks.
-
Worm
- The First Digital World War
- Narrateur(s): Christopher Lane
- Durée: 7 h et 8 min
- Date de publication: 2011-10-11
- Langue: Anglais
- Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,00 $ ou 1 crédit
Prix réduit: 26,00 $ ou 1 crédit
-
-
-
Hacking: 2 Books in 1 Bargain
- The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
- Auteur(s): Miles Price
- Narrateur(s): Matyas Job Gombos
- Durée: 2 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Inside this audiobook, we aim to show you the importance of staying on top of this threat by learning how to hack. While it is true that hackers have received a bad rep over the years, mostly due to biased media reporting, not all hackers have criminal intentions. This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks.
-
Hacking: 2 Books in 1 Bargain
- The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Pen. Testing
- Narrateur(s): Matyas Job Gombos
- Durée: 2 h et 59 min
- Date de publication: 2018-02-23
- Langue: Anglais
-
This audiobook is meant to serve as an educational guide for people who are interested in learning some simple hacking tools, tips, and techniques in order to protect yourself and your computer networks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $ ou 1 crédit
Prix réduit: 8,71 $ ou 1 crédit
-
-
-
Ransomware Protection Playbook
- Auteur(s): Roger A. Grimes
- Narrateur(s): Danny Campbell
- Durée: 10 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.
-
Ransomware Protection Playbook
- Narrateur(s): Danny Campbell
- Durée: 10 h et 28 min
- Date de publication: 2021-12-31
- Langue: Anglais
-
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83 $ ou 1 crédit
Prix réduit: 27,83 $ ou 1 crédit
-
-
-
The CISO Guide to Zero Trust Security
- Auteur(s): Raj Badhwar
- Narrateur(s): Michelle Badhwar
- Durée: 6 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Zero Trust Security framework provides essential security controls to remediate and mitigate advanced cyber threats from compromising our applications and systems. The leaders of our nation, and the business and technology leaders of our firms, have put in a call to arms for CISOs and other security professionals to lead this effort to secure our systems and applications from cyber-attackers.
-
The CISO Guide to Zero Trust Security
- Narrateur(s): Michelle Badhwar
- Durée: 6 h et 41 min
- Date de publication: 2022-08-12
- Langue: Anglais
-
The Zero Trust Security framework provides essential security controls to remediate and mitigate advanced cyber threats from compromising our applications and systems....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Auteur(s): Shashi Shekhar, Pamela Vold
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Billions of people around the globe use various applications of spatial computing daily - by using a ride-sharing app, GPS, social media check-ins, even Pokemon Go. Scientists and researchers use spatial computing to track diseases, map the bottom of the oceans, chart the behavior of endangered species, and create election maps in real time. Drones and driverless cars use a variety of spatial computing technologies. Spatial computing works by understanding the physical world, knowing and communicating our relation to places in that world, and navigating through those places.
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Date de publication: 2020-06-02
- Langue: Anglais
-
Billions of people around the globe use various applications of spatial computing daily-by using a ride-sharing app, GPS, the e911 system, social media check-ins, even Pokemon Go....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $ ou 1 crédit
Prix réduit: 22,26 $ ou 1 crédit
-
-
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Auteur(s): Cybersecurity Bookstore
- Narrateur(s): Will Davidson
- Durée: 2 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security. The book is divided into eight chapters that cover various aspects of IT security and provide practical guidance on how to secure your organization's data and systems.
-
Introduction Into Corporate IT Security
- Fundamental Business Security
- Narrateur(s): Will Davidson
- Durée: 2 h
- Date de publication: 2023-10-24
- Langue: Anglais
-
The book, Introduction to Corporate IT Security, aims to provide a comprehensive overview of the complex and ever-evolving field of information security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $ ou 1 crédit
Prix réduit: 8,71 $ ou 1 crédit
-
-
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Auteur(s): Garrett Sutton Esq., Robert T. Kiyosaki - foreword
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Deceptive misinformation comes at us for many reasons. A key one is to steal our assets. We are free to communicate and stay connected in many ways. This great benefit, however, is now abused by criminal elements to take and defraud, bringing shame on trusting souls. The wreckage wrought by cyber criminality is not only financial but highly emotional. Lives are lost to depression and suicide. Don’t let this happen to you or your family. Scam Proof Your Assets: Guarding Against Widespread Deception gives you the tools and context for protecting yourself.
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Date de publication: 2021-05-03
- Langue: Anglais
-
Scam Proof Your Assets gives you the tools and context for protecting yourself. Unlike other sources, Scam Proof Your Assets teaches you the patterns to look for, including greed and fear, "expert" positioning and charm as manipulation....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 28,27 $ ou 1 crédit
Prix réduit: 28,27 $ ou 1 crédit
-
-
-
Cybersecurity for Beginners Made Easy
- Navigate the Digital Maze With Simple Steps, Real-World Solutions, and Expert Insights to Safeguard Your Online Presence
- Auteur(s): Raiden Tekk
- Narrateur(s): Ben Staab
- Durée: 3 h et 56 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Arm yourself with cybersecurity knowledge and skills to stay safe, informed, and empowered in the digital age. Are you concerned about privacy and cyber attacks in an increasingly complex virtual space? Does integrating cybersecurity solutions into your business seem endlessly daunting and complicated? If so, know you can do plenty to identify, mitigate, and avoid cyber risks. And this book will help you get the ball rolling. It features the powerful SECURE IT framework for simplifying even the most complicated concepts.
-
Cybersecurity for Beginners Made Easy
- Navigate the Digital Maze With Simple Steps, Real-World Solutions, and Expert Insights to Safeguard Your Online Presence
- Narrateur(s): Ben Staab
- Durée: 3 h et 56 min
- Date de publication: 2025-01-13
- Langue: Anglais
-
Arm yourself with cybersecurity knowledge and skills to stay safe, informed, and empowered in the digital age.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
Zero Trust Architecture
- Networking Technology: Security
- Auteur(s): Cindy Green-Ortiz, Brandon Fowler, David Houck, Autres
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Zero Trust Architecture
- Networking Technology: Security
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Date de publication: 2024-04-11
- Langue: Anglais
-
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,27 $ ou 1 crédit
Prix réduit: 31,27 $ ou 1 crédit
-
-
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Auteur(s): Alan T. Norman
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity. The audiobook concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks. Gain the ability to do ethical hacking and penetration testing by taking this hacking audiobook!
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Date de publication: 2019-10-03
- Langue: Anglais
-
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- Auteur(s): Abraham K White
- Narrateur(s): Dalan E Decker
- Durée: 5 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking.
-
Hacking
- The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux, and Penetration Testing
- Narrateur(s): Dalan E Decker
- Durée: 5 h et 49 min
- Date de publication: 2018-04-26
- Langue: Anglais
-
Learn how to hack from this comprehensive audiobook. It will teach you how about the best tools for each kind of hacking, attacking with frameworks, cracking encryption, and various other subjects related to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Auteur(s): Jeffrey Caruso
- Narrateur(s): Mike Lenz
- Durée: 5 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Narrateur(s): Mike Lenz
- Durée: 5 h et 30 min
- Date de publication: 2025-04-29
- Langue: Anglais
-
Cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 14,02 $ ou 1 crédit
Prix réduit: 14,02 $ ou 1 crédit
-
-
-
Term Life
- A Novel of Love, Death, and Computer Security
- Auteur(s): William H. Boyd
- Narrateur(s): Gregg Rizzo
- Durée: 10 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Gus Bishop lives in a trendy downtown Austin condo. He works in computer security for a high tech Austin tech company and drives a high performance car. Yet, something is missing. Every woman he wants eludes him, and his company is under the threat of being hacked. But after an internet search, Gus meets a strange man who represents a unique insurance company - this company insures its clients, not from death, but from a life that is no longer worth living.
-
Term Life
- A Novel of Love, Death, and Computer Security
- Narrateur(s): Gregg Rizzo
- Durée: 10 h et 50 min
- Date de publication: 2017-11-14
- Langue: Anglais
-
Gus Bishop lives in a trendy downtown Austin condo. He works in computer security for a high tech Austin tech company and drives a high performance car. Yet, something is missing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26 $ ou 1 crédit
Prix réduit: 31,26 $ ou 1 crédit
-
-
-
Is Cyber Deterrence Possible?
- Auteur(s): US Department of Defense
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In recent years, the importance of operating in and protecting the cyber domain has gained much attention. As long as our nation relies on computer networks as a foundation for military and economic power, our national and economic security are at risk through the cyber domain. Cyber attacks on US industry and government systems severely impact our economy and ability to execute modern, network-centric warfare.
-
Is Cyber Deterrence Possible?
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Date de publication: 2021-04-10
- Langue: Anglais
-
In recent years, the importance of operating in and protecting the cyber domain has gained much attention. As long as our nation relies on computer networks as a foundation for military and economic power, our national and economic security are at risk through the cyber domain....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95 $ ou 1 crédit
Prix réduit: 4,95 $ ou 1 crédit
-
-
-
We Have Root
- Even More Advice from Schneier on Security
- Auteur(s): Bruce Schneier
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments.
-
We Have Root
- Even More Advice from Schneier on Security
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Date de publication: 2019-11-08
- Langue: Anglais
-
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83 $ ou 1 crédit
Prix réduit: 27,83 $ ou 1 crédit
-
-
-
Cryptography
- Auteur(s): Panos Louridas
- Narrateur(s): Tom Beyer
- Durée: 6 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets.
-
Cryptography
- Narrateur(s): Tom Beyer
- Durée: 6 h et 30 min
- Date de publication: 2024-10-22
- Langue: Anglais
-
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92 $ ou 1 crédit
Prix réduit: 21,92 $ ou 1 crédit
-
-
-
Security Awareness for Dummies
- Auteur(s): Ira Winkler CISSP
- Narrateur(s): Tristan Morris
- Durée: 9 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness for Dummies gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization.
-
Security Awareness for Dummies
- Narrateur(s): Tristan Morris
- Durée: 9 h et 16 min
- Date de publication: 2022-05-24
- Langue: Anglais
-
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $ ou 1 crédit
Prix réduit: 22,26 $ ou 1 crédit
-
-
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- Auteur(s): Kim Crawley
- Narrateur(s): Jo Anna Perrin
- Durée: 7 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical road map to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.
-
8 Steps to Better Security
- A Simple Cyber Resilience Guide for Business
- Narrateur(s): Jo Anna Perrin
- Durée: 7 h et 49 min
- Date de publication: 2021-10-26
- Langue: Anglais
-
Harden your business against internal and external cybersecurity threats with a single accessible resource....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $ ou 1 crédit
Prix réduit: 22,26 $ ou 1 crédit
-
-
-
CyberSecurity Metaverse
- Auteur(s): Sajed Khan
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds. There is a lot of marketing hype wrapped up in this idea of the metaverse, from Crypto, NFT, and Blockchain to digital wardrobes. To help you get a sense of how vague and complex a term the "metaverse" can be, this audiobook is written around the parameters of what the metaverse means but more importantly cybersecurity.
-
CyberSecurity Metaverse
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $ ou 1 crédit
Prix réduit: 8,71 $ ou 1 crédit
-
-
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Date de publication: 2021-01-14
- Langue: Anglais
-
The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-