Computer Security
-
-
Cybersecurity for Normal People
- A Practical Guide to Staying Safe Online
- Auteur(s): Charles Montago
- Narrateur(s): Amanda Utter VO
- Durée: 1 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
When was the last time you used the internet? Chances are, you've been online within the last 10 minutes. While the World Wide Web is integrated into many facets of daily life, there are still risks we take when entering the digital world. But don't fret! Cybersecurity for Normal People is here; your practical guide to staying safe online! Scammers and hackers are all using the same internet we are, and their job is to take advantage of vulnerable users.
-
Cybersecurity for Normal People
- A Practical Guide to Staying Safe Online
- Narrateur(s): Amanda Utter VO
- Durée: 1 h et 22 min
- Date de publication: 2024-09-25
- Langue: Anglais
-
When was the last time you used the internet? Chances are, you've been online within the last 10 minutes. While the World Wide Web is integrated into many facets of daily life, there are still risks we take when entering the digital world.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Practical Cloud Security
- A Guide for Secure Design and Deployment (2nd Edition)
- Auteur(s): Chris Dotson
- Narrateur(s): Stephen Caffrey
- Durée: 11 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.
-
Practical Cloud Security
- A Guide for Secure Design and Deployment (2nd Edition)
- Narrateur(s): Stephen Caffrey
- Durée: 11 h et 18 min
- Date de publication: 2024-09-24
- Langue: Anglais
-
In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Hacking & CompTIA A+
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Purchase Hacking to discover everything you need to know about hacking. Step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one purchase! You need to get it now to know what's inside as it can't be shared here!
-
Hacking & CompTIA A+
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 1 min
- Date de publication: 2016-04-18
- Langue: Anglais
- Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,78$ ou 1 crédit
Prix réduit: 19,78$ ou 1 crédit
-
-
-
Web3 Social
- How Creators Are Changing the World Wide Web (and You Can Too!)
- Auteur(s): Allen Taylor
- Narrateur(s): Allen Taylor
- Durée: 7 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Web3 is emerging to expand the opportunities for creators by delivering tools that help them regain their content freedom, monetize their content better, safeguard their personal data, and fight back against censorship.
-
Web3 Social
- How Creators Are Changing the World Wide Web (and You Can Too!)
- Narrateur(s): Allen Taylor
- Durée: 7 h et 28 min
- Date de publication: 2023-05-18
- Langue: Anglais
-
Web3 is emerging to expand the opportunities for creators by delivering tools that help them regain their content freedom, monetize their content better, safeguard their personal data, and fight back against censorship....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
How to Stay Safe Online
- A Digital Self-Care Toolkit for Developing Resilience and Allyship
- Auteur(s): Seyi Akiwowo
- Narrateur(s): Seyi Akiwowo
- Durée: 7 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Digital spaces are a positive force for change, connection and community, but left unregulated, they are not always safe. Globally, women are 27 times more likely than men to be harassed online. 78 per cent of LGBTQ+ people have experienced hate crime and hate speech online and there has been a 71 per cent rise in online disability abuse. How to Stay Safe Online will teach you how to spot, respond to, and protect yourself from online abuse and learn how to be a good ally to those experiencing it.
-
How to Stay Safe Online
- A Digital Self-Care Toolkit for Developing Resilience and Allyship
- Narrateur(s): Seyi Akiwowo
- Durée: 7 h et 33 min
- Date de publication: 2022-08-25
- Langue: Anglais
-
Digital spaces are a positive force for change, connection and community, but left unregulated, they are not always safe. How to Stay Safe Online will teach you how to spot, respond to, and protect yourself from online abuse and learn how to be a good ally to those experiencing it....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,77$ ou 1 crédit
Prix réduit: 19,77$ ou 1 crédit
-
-
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover everything you need to know about hacking. Step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one download! You need to get it now to know what's inside, as it can't be shared here!
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Date de publication: 2015-12-21
- Langue: Anglais
- Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34$ ou 1 crédit
Prix réduit: 9,34$ ou 1 crédit
-
-
-
Wealthcare
- Demystifying Web3 and the Rise of Personal Data Economies
- Auteur(s): Brigitte Piniewski
- Narrateur(s): Claudia Dunn
- Durée: 6 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Crypto, decentralized blockchains, NFTs, and the ownership economy of web3 hold the future of healthcare. Discover how the metaverse provides innovative business models that are poised to revolutionize the way society approaches health. Wealthcare envisions what healthcare and wellness may look like when accidental wellness is a thing of the past. As web3 technology reshapes finance, supply chain, social media, and other industries, Wealthcare presents a clear case for including healthcare privacy and innovation within this new reality.
-
Wealthcare
- Demystifying Web3 and the Rise of Personal Data Economies
- Narrateur(s): Claudia Dunn
- Durée: 6 h et 7 min
- Date de publication: 2023-08-21
- Langue: Anglais
-
Today’s healthcare system routinely sells your private details for remarkable sums of money. It is grounded in our current inherently flawed web2 world of corporately owned services. In a web3 world, your privacy and health data are yours alone. Wealthcare is your window into that tomorrow....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,19$ ou 1 crédit
Prix réduit: 20,19$ ou 1 crédit
-
-
-
Cybersecurity Jobs 3-in-1 Value Bundle
- Resume Marketing, Career Paths and Work From Home with Cybersecurity
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 5 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
According to the White House, there are 700,000 cybersecurity positions open today. Using the techniques in this series, you can be a part of one of the fastest, highest-salary career paths in IT.
-
Cybersecurity Jobs 3-in-1 Value Bundle
- Resume Marketing, Career Paths and Work From Home with Cybersecurity
- Narrateur(s): Frank Block
- Durée: 5 h et 32 min
- Date de publication: 2023-12-03
- Langue: Anglais
-
According to the White House, there are 700,000 cybersecurity positions open today....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
The Cyber Blueprint
- Quickly Learn How to Become a Cybersecurity Specialist, Develop the Skills Needed for Immediate Employment, and Create a Road Map for a Lucrative Career
- Auteur(s): André Edmond
- Narrateur(s): Scotty Kwas
- Durée: 5 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Have you been struggling to find a guide that explains how to get started in cybersecurity? Does your lack of experience make it difficult to get your first job? The path to cybersecurity excellent can be daunting, especially when you're left to navigate it alone. Countless individuals harbor the same ambition as you, yet they grapple with the same pain points. The lack of a guiding hand leaves them stranded, not knowing which doors to knock on or which paths to tread.
-
The Cyber Blueprint
- Quickly Learn How to Become a Cybersecurity Specialist, Develop the Skills Needed for Immediate Employment, and Create a Road Map for a Lucrative Career
- Narrateur(s): Scotty Kwas
- Durée: 5 h et 51 min
- Date de publication: 2024-06-11
- Langue: Anglais
-
The path to cybersecurity excellent can be daunting, especially when you're left to navigate it alone. Countless individuals harbor the same ambition as you, yet they grapple with the same pain points.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Our Data, Ourselves (First Edition)
- A Personal Guide to Digital Privacy
- Auteur(s): Jacqueline D. Lipton
- Narrateur(s): Corinne Davies
- Durée: 9 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides listeners through important issues involving technology, data collection, and digital privacy as they apply to our daily lives.
-
Our Data, Ourselves (First Edition)
- A Personal Guide to Digital Privacy
- Narrateur(s): Corinne Davies
- Durée: 9 h et 44 min
- Date de publication: 2022-11-22
- Langue: Anglais
-
A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Auteur(s): Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Date de publication: 2024-05-21
- Langue: Anglais
-
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,30$ ou 1 crédit
Prix réduit: 26,30$ ou 1 crédit
-
-
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Date de publication: 2022-04-04
- Langue: Anglais
-
This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Intelligent Safety
- How to Protect Your Connected Family from Big Cybercrime
- Auteur(s): Hari Ravichandran, Jeffrey Katzenberg - foreword
- Narrateur(s): Shawn K. Jain
- Durée: 5 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Intelligent Safety: How to Protect Your Connected Family from Big Cybercrime teaches how we can put our families' online safety on autopilot and regain our peace of mind. It provides families with the tools and knowledge they need to create a personalized, proactive defense against cybercriminals.
-
Intelligent Safety
- How to Protect Your Connected Family from Big Cybercrime
- Narrateur(s): Shawn K. Jain
- Durée: 5 h et 1 min
- Date de publication: 2023-08-08
- Langue: Anglais
-
Turn the tables on cybercriminals. Keep your loved ones safe....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
Criptovalute dalla A alla Z
- Investire in Valute Digitali, NFTs, Metaversi e Finanza Decentralizzata: Tutto quello che Devi Sapere
- Auteur(s): Henry D. Stone
- Narrateur(s): Stefano Trillini, Emanueli Kanani
- Durée: 12 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
La guida definitiva al mondo finanziario del Futuro. Ci sarà un modo parallelo che chiameremo Metaverso. I soldi che ci faremo girare dentro saranno le criptovalute, mentre gli NFT rappresenteranno l'unicità degli oggetti digitali, e non si tratterà soltanto di figurine di scimmie, ma anche di musica, videogiochi, vestiti, passaporti e immobili. I pezzi del puzzle esistono già, sembra che sia arrivato il momento di metterli tutti insieme.
-
Criptovalute dalla A alla Z
- Investire in Valute Digitali, NFTs, Metaversi e Finanza Decentralizzata: Tutto quello che Devi Sapere
- Narrateur(s): Stefano Trillini, Emanueli Kanani
- Durée: 12 h et 12 min
- Date de publication: 2023-06-28
- Langue: Italien
-
La guida definitiva al mondo finanziario del Futuro. Ci sarà un modo parallelo che chiameremo Metaverso. I soldi che ci faremo girare dentro saranno le criptovalute...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,08$ ou 1 crédit
Prix réduit: 31,08$ ou 1 crédit
-
-
-
A Concise Introduction to ISO/IEC 27001:2013
- Auteur(s): ITSM Press
- Narrateur(s): Tom Howery
- Durée: 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a concise introductory guide to the information security management systems (ISMS) standard ISO/IEC 27001:2013....
-
A Concise Introduction to ISO/IEC 27001:2013
- Narrateur(s): Tom Howery
- Durée: 28 min
- Date de publication: 2018-12-19
- Langue: Anglais
-
This is a concise introductory guide to the information security management systems (ISMS) standard ISO/IEC 27001:2013.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- Auteur(s): SentinelOne Publication, Migo Kedem - introduction
- Narrateur(s): SentinelOne
- Durée: 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- Narrateur(s): SentinelOne
- Durée: 53 min
- Date de publication: 2018-08-13
- Langue: Anglais
-
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
Averting the SaaS Data Apocalypse
- The Role Data Protection Will Play in the Battle to Save Our Digital Future
- Auteur(s): Simon Taylor
- Narrateur(s): Matt Brown
- Durée: 4 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The exponential growth in SaaS data poses significant challenges for enterprises worldwide. Averting the SaaS Data Apocalypse offers an in-depth exploration into these complexities, discussing the vulnerabilities of existing data protection systems as the volume of data in SaaS applications expands.
-
Averting the SaaS Data Apocalypse
- The Role Data Protection Will Play in the Battle to Save Our Digital Future
- Narrateur(s): Matt Brown
- Durée: 4 h et 35 min
- Date de publication: 2023-10-10
- Langue: Anglais
-
Averting the SaaS Data Apocalypse offers an in-depth exploration into these complexities, discussing the vulnerabilities of existing data protection systems as the volume of data in SaaS applications expands....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
NIST 800 Control Families in Each RMF Step (NIST 800 Cybersecurity)
- RMF ISSO: NIST 800-53 Controls, Book 2
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 4 h et 26 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process. It is written by someone in the field in layman's terms, with practical use in mind. This book is not a replacement for the NIST 800 special publications. It is a supplemental resource that will give context and meaning to the controls for organizations and cybersecurity professionals tasked with interpreting the security controls.
-
NIST 800 Control Families in Each RMF Step (NIST 800 Cybersecurity)
- RMF ISSO: NIST 800-53 Controls, Book 2
- Narrateur(s): Frank Block
- Série: NIST 800 Cybersecurity, Livre 2
- Durée: 4 h et 26 min
- Date de publication: 2022-08-11
- Langue: Anglais
-
This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process. It is written by someone in the field in layman's terms, with practical use in mind....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,24$ ou 1 crédit
Prix réduit: 25,24$ ou 1 crédit
-
-
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- Auteur(s): Roger A. Grimes
- Narrateur(s): Ray Greenley
- Durée: 11 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.
-
-
I dash think dash you dash need dash links dash in download able dash pdf
- Écrit par Fedaykin Wolf le 2024-05-14
-
Fighting Phishing
- Everything You Can Do to Fight Social Engineering and Phishing
- Narrateur(s): Ray Greenley
- Durée: 11 h et 43 min
- Date de publication: 2024-03-26
- Langue: Anglais
-
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
CHFI Computer Hacking Forensic Investigator
- The Ultimate Study Guide to Ace the Exam
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 5 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Unlock the world of digital investigation and fortify your expertise in Computer Hacking Forensic Investigation (CHFI) with this comprehensive guide. Tailored specifically for aspirants aiming to ace the CHFI certification, this book is a roadmap to success, blending theory with hands-on practice test questions and detailed answers. Explore the intricate landscape of digital forensics as you navigate through chapters meticulously designed to encompass the core elements of CHFI.
-
CHFI Computer Hacking Forensic Investigator
- The Ultimate Study Guide to Ace the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 7 min
- Date de publication: 2023-12-15
- Langue: Anglais
-
Unlock the world of digital investigation and fortify your expertise in Computer Hacking Forensic Investigation (CHFI) with this comprehensive guide....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-