Computer Security
-
-
Scam!
- How to Avoid the Scams That Cost Victims Billions of Dollars Every Year
- Auteur(s): Hope Oje
- Narrateur(s): Alex Freeman
- Durée: 3 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Did you know some people earn their living by stealing from others? SCAM! How to Avoid the Scams That Cost Victims Billions of Dollars Every Year is a short, no-nonsense guide that shows you what to watch out for to protect yourself from the 30 most common types of scams circulating right now.
-
Scam!
- How to Avoid the Scams That Cost Victims Billions of Dollars Every Year
- Narrateur(s): Alex Freeman
- Durée: 3 h et 39 min
- Date de publication: 2022-11-23
- Langue: Anglais
-
SCAM! How to Avoid the Scams That Cost Victims Billions of Dollars Every Year is a short, no-nonsense guide that shows you what to watch out for to protect yourself from the 30 most common types of scams circulating right now....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 1 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- Narrateur(s): Frank Block
- Série: NIST 800 Cybersecurity, Livre 1
- Durée: 1 h et 32 min
- Date de publication: 2022-06-22
- Langue: Anglais
-
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Coding Democracy
- How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
- Auteur(s): Maureen Webb, Cory Doctorow - foreword
- Narrateur(s): Wendy Tremont King
- Durée: 16 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In Coding Democracy, Maureen Webb offers another view. Hackers, she argues, can be vital disruptors. Hacking is becoming a practice, an ethos, and a metaphor for a new wave of activism in which ordinary citizens are inventing new forms of distributed, decentralized democracy for a digital era. Confronted with concentrations of power, mass surveillance, and authoritarianism enabled by new technology, the hacking movement is trying to "build out" democracy into cyberspace.
-
Coding Democracy
- How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
- Narrateur(s): Wendy Tremont King
- Durée: 16 h et 35 min
- Date de publication: 2021-03-09
- Langue: Anglais
-
Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Combatting Cyber Terrorism
- A Guide to Understanding the Cyber Threat Landscape and Incident Response Planning
- Auteur(s): Richard Bingley
- Narrateur(s): Daniel Crespin
- Durée: 6 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook recounts case studies to show the types of threats we face and provides a comprehensive coverage of risk management tactics and strategies to protect yourself against such nefarious threat actors. These include key mitigation and controls for information security or security and HR-related professionals.
-
Combatting Cyber Terrorism
- A Guide to Understanding the Cyber Threat Landscape and Incident Response Planning
- Narrateur(s): Daniel Crespin
- Durée: 6 h et 17 min
- Date de publication: 2024-11-04
- Langue: Anglais
-
Combatting Cyber Terrorism – A guide to understanding the cyber threat landscape and incident response planning, analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Cyber Resilience
- Defense-in-Depth Principles
- Auteur(s): Alan Calder
- Narrateur(s): Alan Medcroft
- Durée: 3 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional. For the foreseeable future (and perhaps beyond), the growth and prominence of data in business shows no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to organizations and people alike. However, these come at more than just a financial cost.
-
Cyber Resilience
- Defense-in-Depth Principles
- Narrateur(s): Alan Medcroft
- Durée: 3 h et 20 min
- Date de publication: 2023-12-21
- Langue: Anglais
-
We live in a world where technology and vast quantities of data play a considerable role in everyday life, both personal and professional....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Fatal System Error
- The Hunt for the New Crime Lords Who Are Bringing Down the Internet
- Auteur(s): Joseph Menn
- Narrateur(s): Christian Rummel
- Durée: 8 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia. His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers.
-
Fatal System Error
- The Hunt for the New Crime Lords Who Are Bringing Down the Internet
- Narrateur(s): Christian Rummel
- Durée: 8 h et 23 min
- Date de publication: 2010-01-11
- Langue: Anglais
- In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
A Concise Introduction to ISO/IEC 27001:2013
- Auteur(s): ITSM Press
- Narrateur(s): Tom Howery
- Durée: 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a concise introductory guide to the information security management systems (ISMS) standard ISO/IEC 27001:2013....
-
A Concise Introduction to ISO/IEC 27001:2013
- Narrateur(s): Tom Howery
- Durée: 28 min
- Date de publication: 2018-12-19
- Langue: Anglais
-
This is a concise introductory guide to the information security management systems (ISMS) standard ISO/IEC 27001:2013.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
The Connected Parent
- An Expert Guide to Parenting in a Digital World
- Auteur(s): John Palfrey, Urs Gasser
- Narrateur(s): Abby Craden
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Today's teenagers spend about nine hours per day online. Parents of this ultra-connected generation struggle with decisions completely new to parenting: Should an 8-year-old be allowed to go on social media? How can parents help their children gain the most from the best aspects of the digital age? How can we keep kids safe from digital harm?
-
The Connected Parent
- An Expert Guide to Parenting in a Digital World
- Narrateur(s): Abby Craden
- Durée: 7 h et 9 min
- Date de publication: 2020-11-11
- Langue: Anglais
-
Today's teenagers spend about nine hours per day online. Parents of this ultra-connected generation struggle with decisions completely new to parenting: How can parents help their children gain the most from the best aspects of the digital age? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,24$ ou 1 crédit
Prix réduit: 25,24$ ou 1 crédit
-
-
-
Evolving Electric Power Systems and Cybersecurity
- Auteur(s): Congressional Research Service
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging, and one of the tools for modernizing the system is the incorporation of computerized systems that allow for the rapid monitoring and control of the equipment used in the grid. Connecting these systems to the internet has increased the ability to remotely control aspects of the grid, but this has come with increasing concern for the grid’s cybersecurity.
-
Evolving Electric Power Systems and Cybersecurity
- Narrateur(s): Tom Brooks
- Durée: 2 h et 40 min
- Date de publication: 2021-11-29
- Langue: Anglais
-
Electricity is essentially the lifeblood of the modern, technological society that we enjoy, for without it, the devices and machinery that enable our economy would not be able to function. The US grid is aging....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Black Scorpion Pilot
- A Ford Stevens Military-Aviation Thriller, Volume 2
- Auteur(s): Lawrence A. Colby
- Narrateur(s): Christopher Raab
- Durée: 9 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In a hidden base in China, Lieutenant General He Chen licks his wounds. The Devil Dragon project lies in ruins, thanks to the heroics of US Air Force Reserve Captain Ford Stevens and Stevens's best friend, pilot Wu Lee. But now Lee is gone, and as Stevens mourns the loss of his friend, Chen works to complete his second spy plane, codenamed Black Scorpion.
-
The Black Scorpion Pilot
- A Ford Stevens Military-Aviation Thriller, Volume 2
- Narrateur(s): Christopher Raab
- Série: Ford Stevens Military-Aviation Thrillers, Livre 2
- Durée: 9 h et 19 min
- Date de publication: 2019-05-29
- Langue: Anglais
-
In a hidden base in China, Lieutenant General He Chen licks his wounds. The Devil Dragon project lies in ruins, thanks to the heroics of US Air Force Reserve Captain Ford Stevens and Stevens's best friend, pilot Wu Lee....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
The Social Engineer's Playbook: A Practical Guide to Pretexting
- Auteur(s): Jeremiah Talamantes
- Narrateur(s): Tom Taverna
- Durée: 3 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others. This book covers an introduction to tools, such as: Maltego, Social Engineer Toolkit, Dradis, Metasploit, and Kali Linux among others. Crucial to any social engineering test is the information used to build it. Discover the most valuable sources of intel and how to put them to use.
-
The Social Engineer's Playbook: A Practical Guide to Pretexting
- Narrateur(s): Tom Taverna
- Durée: 3 h
- Date de publication: 2017-11-06
- Langue: Anglais
-
The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Hacking
- Fundamentals for Absolute Beginners
- Auteur(s): Alexander Bell
- Narrateur(s): Kevin Hung-Liang
- Durée: 3 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
For a beginner, hacking can seem like something scary or hard to do. Sometimes, we see movies and read the news on how systems such as Snapchat, eBay, or Google have been compromised and imagine that hacking is difficult. We think of it as something meant for people spending 24 hours a day in a basement, somewhere. This is not the case. This field is open for anyone.
-
Hacking
- Fundamentals for Absolute Beginners
- Narrateur(s): Kevin Hung-Liang
- Durée: 3 h et 8 min
- Date de publication: 2020-04-30
- Langue: Anglais
-
For a beginner, hacking can seem like something scary or hard to do. Sometimes, we see movies and read the news on how systems such as Snapchat, eBay, or Google have been compromised and imagine that hacking is difficult....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Mastering Cybersecurity Interviews
- Expert Tips to Boost Your Cybersecurity Career and Land That Job
- Auteur(s): Taimur Ijlal
- Narrateur(s): Jim Cooper
- Durée: 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you ready to dominate your next cybersecurity interview? Dive into "Mastering Cybersecurity Interviews," the ultimate guide for anyone aspiring to excel in the competitive field of cybersecurity. Whether you're a seasoned professional or a newcomer, this book is tailored to skyrocket your interview skills.
-
Mastering Cybersecurity Interviews
- Expert Tips to Boost Your Cybersecurity Career and Land That Job
- Narrateur(s): Jim Cooper
- Durée: 42 min
- Date de publication: 2024-12-11
- Langue: Anglais
-
Are you ready to dominate your next cybersecurity interview? Dive into "Mastering Cybersecurity Interviews," the ultimate guide for anyone aspiring to excel in the competitive field of cybersecurity.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
A Practical Guide to GDPR for Small Businesses
- Auteur(s): Nick Ioannou
- Narrateur(s): Douglas Birk
- Durée: 1 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The general data protection regulation or GDPR is a 57,500+ worded legislation that applies to every business or organization that handles personal information of those citizens living in EU and the UK, regardless of the size of the organization. For many small businesses, complying with GDPR is a daunting task, but it doesn’t need to be.
-
A Practical Guide to GDPR for Small Businesses
- Narrateur(s): Douglas Birk
- Durée: 1 h et 33 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
The general data protection regulation or GDPR is a 57,500+ worded legislation that applies to every business or organization that handles personal information of those citizens living in EU and the UK, regardless of the size of the organization....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process.
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Date de publication: 2023-10-10
- Langue: Anglais
-
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Mysterious Affair at Olivetti
- IBM, the CIA, and the Cold War Conspiracy to Shut Down Production of the World's First Desktop Computer
- Auteur(s): Meryle Secrest
- Narrateur(s): Susan Denaker
- Durée: 11 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The never-before-told true account of the design and development of the first desktop computer by the world's most famous high-styled typewriter company, more than a decade before the arrival of the Osborne 1, the Apple 1, the first Intel microprocessor, and IBM's PC5150.
-
The Mysterious Affair at Olivetti
- IBM, the CIA, and the Cold War Conspiracy to Shut Down Production of the World's First Desktop Computer
- Narrateur(s): Susan Denaker
- Durée: 11 h et 27 min
- Date de publication: 2019-11-05
- Langue: Anglais
-
The never-before-told true account of the design and development of the first desktop computer by the world's most famous high-styled typewriter company, more than a decade before the arrival of the Osborne 1, the Apple 1, the first Intel microprocessor, and IBM's PC5150....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,22$ ou 1 crédit
Prix réduit: 26,22$ ou 1 crédit
-
-
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Auteur(s): Lester Evans
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you want to avoid getting hacked, having your information spread, and discover the world of ethical hacking then pay attention.... Two manuscripts in one audiobook: Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyber-Warfare, Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber-Security of Computer Networks, Including Tips on Social Engineering.
-
-
An interesting read, not a guide or study manual
- Écrit par Joel C LaRusic le 2019-08-06
-
Cybersecurity
- What You Need to Know About Computer and Cyber Security, Social Engineering, the Internet of Things + An Essential Guide to Ethical Hacking for Beginners
- Narrateur(s): Michael Reaves, Brian R. Scott
- Durée: 6 h et 34 min
- Date de publication: 2019-02-07
- Langue: Anglais
-
How hackers use raunchy photos to eke out private information; examples of preposterous social engineering attacks; how there's only one surefire way to protect against hacking; how to lower your exposure to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Malware Detection & Threats Made Easy!
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 1 h et 24 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is malware what you want to learn? Always wondered how malware works? Does it interest you how viruses compromise your computer? Listen to this book to discover everything you need to know about tech threats. Learn step by step how to increase your malware skill set. Learn how to detect threats on your computer systems. All the basic knowledge you need is here!
-
Malware Detection & Threats Made Easy!
- Narrateur(s): Millian Quinteros
- Durée: 1 h et 24 min
- Date de publication: 2016-02-22
- Langue: Anglais
- Learn step by step how to increase your malware skill set. Learn how to detect threats on your computer systems. All the basic knowledge you need is here!...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-