Computer Security
-
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected. This is where the IAPP CIPP/US (Certified Information Privacy Professional/United States) certification steps in, acting as your passport to a thriving career in the ever-evolving field of data privacy.
-
IAPP CIPP/US Certification
- A Practical Study Guide to Master the Certified Information Privacy Professional Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 6 min
- Date de publication: 2024-03-06
- Langue: Anglais
-
In today's digital age, data is the new currency. Businesses are collecting more information than ever before, and individuals are increasingly concerned about how their personal details are used and protected.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Auteur(s): Steve Watkins
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022.
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Date de publication: 2023-09-06
- Langue: Anglais
-
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Zero Trust
- Navigating Cybersecurity Risks in Third-Party Environments
- Auteur(s): Jafar Hasan
- Narrateur(s): Andrew Baldwin, Jafar Hasan
- Durée: 6 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In today's digital age, where businesses operate in an interconnected and rapidly evolving technological landscape, cybersecurity has emerged as a critical concern. With the increasing reliance on digital systems, cloud services, and interconnected networks, organizations face many cybersecurity challenges that demand proactive and robust risk management strategies.
-
Zero Trust
- Navigating Cybersecurity Risks in Third-Party Environments
- Narrateur(s): Andrew Baldwin, Jafar Hasan
- Durée: 6 h et 1 min
- Date de publication: 2024-04-15
- Langue: Anglais
-
In today's digital age, where businesses operate in an interconnected and rapidly evolving technological landscape, cybersecurity has emerged as a critical concern.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Worm
- The First Digital World War
- Auteur(s): Mark Bowden
- Narrateur(s): Christopher Lane
- Durée: 7 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide. When Conficker was unleashed in November 2008, cybersecurity experts did not know what to make of it. Exploiting security flaws in Microsoft Windows, it grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks.
-
Worm
- The First Digital World War
- Narrateur(s): Christopher Lane
- Durée: 7 h et 8 min
- Date de publication: 2011-10-11
- Langue: Anglais
- Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,00$ ou 1 crédit
Prix réduit: 26,00$ ou 1 crédit
-
-
-
How to Measure Anything in Cybersecurity Risk
- Auteur(s): Douglas W. Hubbard, Richard Seiersen
- Narrateur(s): Patrick Cronin
- Durée: 10 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
How to Measure Anything in Cybersecurity Risk
- Narrateur(s): Patrick Cronin
- Durée: 10 h et 21 min
- Date de publication: 2016-11-29
- Langue: Anglais
- This book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
The NIST Framework (CSF) 2.0
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 2 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization - regardless of its size, sector, or maturity - to better understand, assess, prioritize, and communicate its cybersecurity efforts.
-
-
just reading an online free PFF
- Écrit par Haidy Giratallah le 2024-05-28
-
The NIST Framework (CSF) 2.0
- Narrateur(s): Tom Brooks
- Durée: 2 h et 33 min
- Date de publication: 2024-04-02
- Langue: Anglais
-
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Raising Humans in a Digital World
- Helping Kids Build a Healthy Relationship with Technology
- Auteur(s): Diana Graber
- Narrateur(s): Jill Blackwood
- Durée: 7 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Digital literacy advocate Diana Graber demystifies the complicated digital landscape facing today’s kids and provides answers for parents and teachers eager to show them how to use technology as an empowering force in their lives and in their role as future leaders.
-
Raising Humans in a Digital World
- Helping Kids Build a Healthy Relationship with Technology
- Narrateur(s): Jill Blackwood
- Durée: 7 h et 39 min
- Date de publication: 2019-01-15
- Langue: Anglais
-
Digital literacy advocate Diana Graber demystifies the complicated digital landscape facing today’s kids and provides answers for parents and teachers eager to show them how to use technology as an empowering force in their lives and in their role as future leaders....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 29,13$ ou 1 crédit
Prix réduit: 29,13$ ou 1 crédit
-
-
-
Cybersecurity Essentials
- Auteur(s): Charles J. Brooks, Christopher Grow, Philip Craig, Autres
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Awful as an e-book
- Écrit par Mac le 2021-07-25
-
Cybersecurity Essentials
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Date de publication: 2018-10-30
- Langue: Anglais
-
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53$ ou 1 crédit
Prix réduit: 37,53$ ou 1 crédit
-
-
-
Ten Steps to ITSM Success
- Auteur(s): Timothy Rogers, Angelo Esposito
- Narrateur(s): Peter Silverleaf
- Durée: 6 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As organizations seek to boost revenue, cut costs, and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. Ten Steps to ITSM Success helps IT to prepare for this role by providing a detailed and practical guide to implementing ITSM best practices. It is aimed at ITSM practitioners and consultants, but will also be of interest to IT directors and C-suite executives looking to transform the role of IT into a value-creating business partner.
-
Ten Steps to ITSM Success
- Narrateur(s): Peter Silverleaf
- Durée: 6 h et 42 min
- Date de publication: 2018-12-10
- Langue: Anglais
-
As organizations seek to boost revenue, cut costs, and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. This guide helps IT to prepare for this role by providing a detailed and practical guide to implementing ITSM best practices....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Auteur(s): Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website.
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 14,47$ ou 1 crédit
Prix réduit: 14,47$ ou 1 crédit
-
-
-
API Security in Action
- Auteur(s): Neil Madden
- Narrateur(s): Marianne Sheehan
- Durée: 20 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A web API is an efficient way to communicate with an application or service. However, this convenience opens your systems to new security risks. API Security in Action gives you the skills to build strong, safe APIs you can confidently expose to the world.
-
API Security in Action
- Narrateur(s): Marianne Sheehan
- Durée: 20 h et 5 min
- Date de publication: 2021-07-14
- Langue: Anglais
-
A web API is an efficient way to communicate with an application or service. However, this convenience opens your systems to new security risks. API Security in Action gives you the skills to build strong, safe APIs you can confidently expose to the world...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53$ ou 1 crédit
Prix réduit: 37,53$ ou 1 crédit
-
-
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Date de publication: 2021-01-14
- Langue: Anglais
-
The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The Code of Honor
- Embracing Ethics in Cybersecurity
- Auteur(s): Paul J. Maurer, Ed Skoudis
- Narrateur(s): Rick Adamson
- Durée: 5 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, president of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, president of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world.
-
The Code of Honor
- Embracing Ethics in Cybersecurity
- Narrateur(s): Rick Adamson
- Durée: 5 h et 42 min
- Date de publication: 2024-08-13
- Langue: Anglais
-
While some professions-including medicine, law, and engineering-have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Auteur(s): Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Date de publication: 2024-05-21
- Langue: Anglais
-
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,30$ ou 1 crédit
Prix réduit: 26,30$ ou 1 crédit
-
-
-
Cyber Security Program and Policy Using NIST Cybersecurity Framework
- NIST Cybersecurity Framework (CSF), Book 2
- Auteur(s): Bruce Brown, convocourses
- Narrateur(s): Kim Pepper
- Durée: 3 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In today's digital age, safeguarding your organization's assets from cyber threats is paramount. Equip yourself with the knowledge and tools necessary with Cyber Security Program and Policy Using NIST Cybersecurity Framework by seasoned cybersecurity professionals. This guide steers you through the process of creating robust, professional documents and procedures designed to protect your data and digital assets from evolving cyber risks.
-
Cyber Security Program and Policy Using NIST Cybersecurity Framework
- NIST Cybersecurity Framework (CSF), Book 2
- Narrateur(s): Kim Pepper
- Série: NIST Cybersecurity Framework, Livre 2
- Durée: 3 h et 29 min
- Date de publication: 2023-09-25
- Langue: Anglais
-
This guide steers you through the process of creating robust, professional documents and procedures designed to protect your data and digital assets from evolving cyber risks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Auteur(s): L.D. Knowings
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
You're not a tech wizard, and you don't need to be. This book speaks directly to you the concerned netizen, the proactive parent, the small business owner, or the budding entrepreneur. It's designed to break down the complexities of cybersecurity into something you can understand and apply.
-
Cybersecurity 101
- A Dummy's Guide for Beginners
- Narrateur(s): David Van Der Molen
- Durée: 3 h et 41 min
- Date de publication: 2024-06-05
- Langue: Anglais
-
Worried about hackers? Fight back with confidence! Discover straightforward steps to safeguard your online presence perfect for non-techies and pros alike.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cybersecurity for Beginners
- Auteur(s): Raef Meeuwisse
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
Cybersecurity for Beginners
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Date de publication: 2017-09-21
- Langue: Anglais
- This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
ISO 9001:2015
- A Pocket Guide
- Auteur(s): Steve Watkins, Nick Orchiston
- Narrateur(s): Andy Cresswell
- Durée: 1 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Currently used by more than 1.1 million organizations worldwide, the international standard ISO 9001:2015 is the world’s most established quality framework. ISO 9001:2015 - A Pocket Guide is a handy reference audiobook that provides an overview of the ISO 9001 quality management standard.
-
ISO 9001:2015
- A Pocket Guide
- Narrateur(s): Andy Cresswell
- Durée: 1 h et 11 min
- Date de publication: 2018-12-04
- Langue: Anglais
-
Currently used by more than 1.1 million organizations worldwide, the international standard ISO 9001:2015 is the world’s most established quality framework. This is a handy reference audiobook that provides an overview of the ISO 9001 quality management standard....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Computer Hacking Beginners Guide
- How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
- Auteur(s): Alan T. Norman
- Narrateur(s): Jack Ares
- Durée: 1 h et 57 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book will teach you how you can protect yourself from most common hacking attacks - by knowing how hacking actually works! After all, in order to prevent your system from being compromised, you need to stay a step ahead of any criminal hacker. You can do that by learning how to hack and how to do a counter-hack.
-
Computer Hacking Beginners Guide
- How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
- Narrateur(s): Jack Ares
- Durée: 1 h et 57 min
- Date de publication: 2019-09-19
- Langue: Anglais
-
This book will teach you how you can protect yourself from most common hacking attacks - by knowing how hacking actually works....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- Auteur(s): John P. Carlin, Garrett M. Graff
- Narrateur(s): Kevin Stillwell
- Durée: 16 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Eye-opening!
- Écrit par Bradley Banks le 2019-02-01
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- Narrateur(s): Kevin Stillwell
- Durée: 16 h et 59 min
- Date de publication: 2018-10-16
- Langue: Anglais
-
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 39,38$ ou 1 crédit
Prix réduit: 39,38$ ou 1 crédit
-