Computer Security
-
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Auteur(s): Niels Starling
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security. We all think our information is at risk when actually hiding it away runs the greatest risk.
-
The Myth of Security
- Hackers’ Inventions Will Win the Race for Information
- Narrateur(s): Simon de Deney
- Durée: 3 h et 12 min
- Date de publication: 2020-12-16
- Langue: Anglais
-
Author Niels Starling shares his unusual and unconventional narrative about information security. In a counterintuitive approach, Niels argues that the majority of internet users have too high a focus on information protection and online security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cyber Security
- Learn the Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies
- Auteur(s): Noah Zhang, Dana Onyshko
- Narrateur(s): Gary Westphalen
- Durée: 3 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Companies that can use technology wisely and well are booming, and companies that make bad or no technology choices collapse and disappear. The cloud, smart devices, and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. The bad actors are in on this, too, and it creates a real problem right now for every individual and business.
-
Cyber Security
- Learn the Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies
- Narrateur(s): Gary Westphalen
- Durée: 3 h et 42 min
- Date de publication: 2020-10-13
- Langue: Anglais
-
Companies that can use technology wisely and well are booming, and companies that make bad or no technology choices collapse and disappear. The cloud, smart devices, and the ability to connect almost any object to the internet are an essential landscape to use....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The Hidden Corporation
- A Data Management Security Novel
- Auteur(s): David Schlesinger
- Narrateur(s): Bobby Hundley
- Durée: 5 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss.
-
The Hidden Corporation
- A Data Management Security Novel
- Narrateur(s): Bobby Hundley
- Durée: 5 h et 38 min
- Date de publication: 2016-09-29
- Langue: Anglais
- Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,40$ ou 1 crédit
Prix réduit: 26,40$ ou 1 crédit
-
-
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet. A global, multistakeholder community made up of many organizations shapes internet policy, operations, and security. But the ongoing and increasing reliance on the internet underscores the need to understand the risks to its underlying architecture.
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cryptology for Beginners
- #1 Guide for Security, Encryption, Crypto, Algorithms and Python
- Auteur(s): Jake T Mills
- Narrateur(s): Tom Brooks
- Durée: 3 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In a world where data flows freely and communication spans the globe, the need for secure and private communication has never been more critical. This book invites you on an illuminating journey into the captivating realm of secure communication, demystifying the intricate techniques that have protected secrets and guarded information for centuries.
-
Cryptology for Beginners
- #1 Guide for Security, Encryption, Crypto, Algorithms and Python
- Narrateur(s): Tom Brooks
- Durée: 3 h et 51 min
- Date de publication: 2023-08-16
- Langue: Anglais
-
In a world where data flows freely and communication spans the globe, the need for secure and private communication has never been more critical....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process.
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Date de publication: 2023-10-10
- Langue: Anglais
-
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Digital Armor: Business Cyber Defense Strategies
- Defending the Digital Frontline: Cybersecurity Tactics for Businesses
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In the rapidly evolving digital age, cybersecurity has emerged as a cornerstone of business resilience and continuity. "The Digital Armor: Business Cyber Defense Strategies - Defending the Digital Frontline: Cybersecurity Tactics for Businesses" by Tom Brooks is a comprehensive guide designed to navigate the complex cybersecurity landscape facing today's organizations. This book offers a multi-faceted approach to fortify defenses, emphasizing the integration of technology, policy, and education to safeguard against the myriad cyber threats that businesses encounter.
-
The Digital Armor: Business Cyber Defense Strategies
- Defending the Digital Frontline: Cybersecurity Tactics for Businesses
- Narrateur(s): Tom Brooks
- Durée: 2 h et 22 min
- Date de publication: 2024-02-22
- Langue: Anglais
-
This audiobook offers a multi-faceted approach to fortify defenses, emphasizing the integration of technology, policy, and education to safeguard against the myriad cyber threats that businesses encounter.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Sinister Shackles
- Understanding Ransomware: Data Encryption and Extortion
- Auteur(s): Logan Lockwood
- Narrateur(s): Sean P. Chapman
- Durée: 1 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Arm yourself with proactive measures and best practices to fortify your defenses. With this invaluable knowledge, you will be equipped to safeguard your organization and ensure its resilience in the face of this ever-present danger. The time to act is now—protect your business from the relentless onslaught of ransomware and its sinister shackles.
-
Sinister Shackles
- Understanding Ransomware: Data Encryption and Extortion
- Narrateur(s): Sean P. Chapman
- Durée: 1 h et 39 min
- Date de publication: 2023-08-14
- Langue: Anglais
-
Arm yourself with proactive measures and best practices to fortify your defenses. With this invaluable knowledge, you will be equipped to safeguard your organization and ensure its resilience in the face of this ever-present danger....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
-
Cybersecurity & Infrastructure Security Agency Tips
- Stop Ransomware Guide
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2023-06-12
- Langue: Anglais
-
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
StopRansomware Guide
- Auteur(s): CISA NSA FBI and Multistate Information Sharing and Analysis Center
- Narrateur(s): Tom Brooks
- Durée: 3 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Over time, malicious actors have adjusted their ransomware tactics to be more destructive and impactful, and have also exfiltrated victim data and pressured victims to pay by threatening to release the stolen data.
-
StopRansomware Guide
- Narrateur(s): Tom Brooks
- Durée: 3 h et 9 min
- Date de publication: 2023-11-08
- Langue: Anglais
-
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Hacking & Open Source
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does how hackers never seem to get caught interest you? Purchase Hacking to discover everything you need to know about hacking. Learn step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one purchase!
-
Hacking & Open Source
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 3 min
- Date de publication: 2016-03-29
- Langue: Anglais
- Learn step by step how to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge is here in one download....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,10$ ou 1 crédit
Prix réduit: 20,10$ ou 1 crédit
-
-
-
Hacking & Malware
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does how hackers never seem to get caught interest you? Purchase Hacking to discover everything you need to know about hacking. Learn step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one purchase!
-
Hacking & Malware
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 3 min
- Date de publication: 2016-03-30
- Langue: Anglais
- Is hacking what you want to learn? Always wondered how one becomes a hacker? Purchase Hacking to discover everything you need to know....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,10$ ou 1 crédit
Prix réduit: 20,10$ ou 1 crédit
-
-
-
Wiki at War: Conflict in a Socially Networked World
- Auteur(s): Dr. James Jay Carafano PhD
- Narrateur(s): Gary L. Willprecht
- Durée: 14 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people. WikiLeaks editor-in-chief Julian Assange has been branded "public enemy number one" by some in the United States for posting material on the World Wide Web that concerns airstrikes in Iraq, US diplomatic communications, and other sensitive matters.
-
Wiki at War: Conflict in a Socially Networked World
- Narrateur(s): Gary L. Willprecht
- Durée: 14 h et 12 min
- Date de publication: 2013-07-17
- Langue: Anglais
- In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 33,01$ ou 1 crédit
Prix réduit: 33,01$ ou 1 crédit
-
-
-
Cybersecurity Hacking Guide
- A Guide to Wireless Penetration
- Auteur(s): Lei Felsen
- Narrateur(s): Steve Baughn
- Durée: 3 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It's no secret that computers are insecure. Stories like the recent Facebook hack and the hacking of government agencies are just the tip of the iceberg because hacking is taking over the world. With more and more people moving online and doing almost any task that they can there, it is likely that hacking is just going to increase over time. Our personal, financial, and business information is all found online, and this is a big goldmine for hackers all throughout the world.
-
Cybersecurity Hacking Guide
- A Guide to Wireless Penetration
- Narrateur(s): Steve Baughn
- Durée: 3 h et 20 min
- Date de publication: 2020-09-22
- Langue: Anglais
-
It's no secret that computers are insecure. Stories like the recent Facebook hack and the hacking of government agencies are just the tip of the iceberg because hacking is taking over the world....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The Travel Hacking Pocket Guide
- Protect Your Family and Business from Cyber Attacks
- Auteur(s): Lee Felsin
- Narrateur(s): John Taylor
- Durée: 3 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every chapter in this audiobook contains examples and definitions that are easy to follow and understand. You will learn the basics of hacking, how to operate and use terminal commands, followed by an extensive guide on how to perform all the steps of a penetration test.
-
The Travel Hacking Pocket Guide
- Protect Your Family and Business from Cyber Attacks
- Narrateur(s): John Taylor
- Durée: 3 h et 20 min
- Date de publication: 2020-09-22
- Langue: Anglais
-
Every chapter in this audiobook contains examples and definitions that are easy to follow and understand. You will learn the basics of hacking, how to operate and use terminal commands, followed by an extensive guide on how to perform all the steps of a penetration test....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Kali Linux: Secure Your Network
- How to Prevent Cyber Terrorism and Defend Your Network with Kali Linux
- Auteur(s): Frank Eltrinos
- Narrateur(s): Rudy Norman
- Durée: 3 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Increasingly, technology is becoming more advanced. A secure network can be a great tool, allowing you to store vast amounts of information. However, this has given more power to those with hacking skills, who can exploit poor cybersecurity. Thankfully, you can protect yourself. This audiobook will show you the techniques required to build a secure network in Kali Linux.
-
Kali Linux: Secure Your Network
- How to Prevent Cyber Terrorism and Defend Your Network with Kali Linux
- Narrateur(s): Rudy Norman
- Durée: 3 h et 53 min
- Date de publication: 2020-02-27
- Langue: Anglais
-
Increasingly, technology is becoming more advanced. A secure network can be a great tool, allowing you to store vast amounts of information. However, this has given more power to those with hacking skills, who can exploit poor cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Hacking
- The Ultimate Comprehensive Step-by-Step Guide to the Basics of Ethical Hacking
- Auteur(s): Kevin Clark
- Narrateur(s): Jim D. Johnston
- Durée: 3 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook will help you learn to hack in an easy and step-by-step method. Previously, only computer networks were getting hacked, but in today’s modern world, technology has grown immensely, and now, many other fields are vulnerable to hacking. From laptops to smartphones to printers, our devices are getting more prone to hacking, as hackers target common users to get access to their confidential information or bank details.
-
Hacking
- The Ultimate Comprehensive Step-by-Step Guide to the Basics of Ethical Hacking
- Narrateur(s): Jim D. Johnston
- Durée: 3 h et 27 min
- Date de publication: 2020-01-29
- Langue: Anglais
-
This audiobook will help you learn to hack in an easy and step-by-step method. Previously, only computer networks were getting hacked, but in today’s modern world, technology has grown immensely, and now, many other fields are vulnerable to hacking....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 15,10$ ou 1 crédit
Prix réduit: 15,10$ ou 1 crédit
-
-
-
Tor and the Dark Net
- Remain Anonymous and Evade NSA Spying
- Auteur(s): James Smith
- Narrateur(s): John Wray
- Durée: 3 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
So many people take their privacy on the Internet for granted. Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Whether you're simply browsing websites or you are accessing confidential information that you would rather no one know about there are ways to remain anonymous.
-
Tor and the Dark Net
- Remain Anonymous and Evade NSA Spying
- Narrateur(s): John Wray
- Durée: 3 h et 21 min
- Date de publication: 2016-12-14
- Langue: Anglais
- So many people take their privacy on the Internet for granted. Some may know and choose to ignore the fact, but every single thing you do online is being tracked....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,78$ ou 1 crédit
Prix réduit: 19,78$ ou 1 crédit
-
-
-
Hacking & CompTIA A+
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Purchase Hacking to discover everything you need to know about hacking. Step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one purchase! You need to get it now to know what's inside as it can't be shared here!
-
Hacking & CompTIA A+
- Narrateur(s): Millian Quinteros
- Durée: 3 h et 1 min
- Date de publication: 2016-04-18
- Langue: Anglais
- Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,78$ ou 1 crédit
Prix réduit: 19,78$ ou 1 crédit
-
-
-
There's a War Going On but No One Can See It
- Auteur(s): Huib Modderkolk
- Narrateur(s): Omar Baroud
- Durée: 8 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us.
-
There's a War Going On but No One Can See It
- Narrateur(s): Omar Baroud
- Durée: 8 h et 42 min
- Date de publication: 2021-09-02
- Langue: Anglais
-
Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,12$ ou 1 crédit
Prix réduit: 19,12$ ou 1 crédit
-