Computer Security
-
-
Cybersecurity for Dummies
- Auteur(s): Joseph Steinberg
- Narrateur(s): BJ Harrison
- Durée: 13 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
Cybersecurity for Dummies
- Narrateur(s): BJ Harrison
- Durée: 13 h et 1 min
- Date de publication: 2019-12-10
- Langue: Anglais
-
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist and how to identify, protect against, detect, and respond to them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Auteur(s): Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- Écrit par Mr. C le 2018-02-27
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
- Date de publication: 2017-02-14
- Langue: Anglais
- In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 28,27$ ou 1 crédit
Prix réduit: 28,27$ ou 1 crédit
-
-
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- Auteur(s): Quinn Kiser
- Narrateur(s): Ivan Busenius
- Durée: 7 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Very nice intro book!
- Écrit par Vince le 2021-05-12
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- Narrateur(s): Ivan Busenius
- Durée: 7 h et 1 min
- Date de publication: 2020-10-28
- Langue: Anglais
-
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Clean Code
- A Handbook of Agile Software Craftsmanship
- Auteur(s): Robert C. Martin
- Narrateur(s): Theodore O'Brien
- Durée: 5 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Noted software expert Robert C. Martin presents a revolutionary paradigm with Clean Code: A Handbook of Agile Software Craftsmanship. Martin has teamed up with his colleagues from Object Mentor to distill their best agile practice of cleaning code “on the fly” into a book that will instill within you the values of a software craftsman and make you a better programmer - but only if you work at it.
-
-
Good tips to follow while coding
- Écrit par Serge Jabo Byusa le 2022-11-07
-
Clean Code
- A Handbook of Agile Software Craftsmanship
- Narrateur(s): Theodore O'Brien
- Durée: 5 h et 49 min
- Date de publication: 2021-02-27
- Langue: Anglais
-
This book is a must for any developer, software engineer, project manager, team lead, or systems analyst with an interest in producing better code....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
LikeWar
- The Weaponization of Social Media
- Auteur(s): P. W. Singer, Emerson T. Brooking
- Narrateur(s): George Guidall
- Durée: 11 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the Internet is changing war and politics, just as war and politics are changing the Internet. Terrorists livestream their attacks, “Twitter wars” produce real world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones.
-
-
Great read
- Écrit par P. M. le 2019-12-13
-
LikeWar
- The Weaponization of Social Media
- Narrateur(s): George Guidall
- Durée: 11 h et 21 min
- Date de publication: 2018-10-02
- Langue: Anglais
-
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the Internet is changing war and politics, just as war and politics are changing the Internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Computer Networking
- The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
- Auteur(s): Michael B. White
- Narrateur(s): Jim D. Johnston
- Durée: 10 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Technology has gradually transitioned from wired to wireless over the years with tons of benefits. From the internet of things to wireless communication, we are all witnesses of the huge benefits of wireless technologies. This audiobook covers various subjects and highlights both the benefits and challenges of wireless technologies.
-
-
Lisp
- Écrit par Kevin le 2024-06-01
-
Computer Networking
- The Complete Guide to Understanding Wireless Technology, Network Security, Computer Architecture and Communications Systems (Including Cisco, CCNA and CCENT)
- Narrateur(s): Jim D. Johnston
- Durée: 10 h et 6 min
- Date de publication: 2019-02-18
- Langue: Anglais
-
Technology has gradually transitioned from wired to wireless over the years with tons of benefits. This audiobook covers various subjects and highlights both the benefits and challenges of wireless technologies....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- Auteur(s): Bruce Schneier
- Narrateur(s): Dan John Miller
- Durée: 9 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Info overload
- Écrit par David Gloyn-cox le 2018-09-19
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- Narrateur(s): Dan John Miller
- Durée: 9 h et 27 min
- Date de publication: 2015-03-17
- Langue: Anglais
- In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Read Write Own
- Building the Next Era of the Internet
- Auteur(s): Chris Dixon
- Narrateur(s): Robert Petkoff, Chris Dixon
- Durée: 8 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The internet of today is a far cry from its early promise of a decentralized, democratic network of innovation, connection, and freedom. In the past decade, it has fallen almost entirely under the control of a very small group of companies like Apple, Google, and Facebook. In Read Write Own, tech visionary Chris Dixon argues that the dream of an open network for fostering creativity and entrepreneurship doesn’t have to die and can, in fact, be saved with blockchain networks.
-
Read Write Own
- Building the Next Era of the Internet
- Narrateur(s): Robert Petkoff, Chris Dixon
- Durée: 8 h et 9 min
- Date de publication: 2024-01-30
- Langue: Anglais
-
Influential technology entrepreneur and startup investor Chris Dixon explores the power of blockchains to reshape the future of the internet—and how that affects us all....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,22$ ou 1 crédit
Prix réduit: 26,22$ ou 1 crédit
-
-
-
The Art of Deception
- Controlling the Human Element of Security
- Auteur(s): Kevin Mitnick
- Narrateur(s): Nick Sullivan
- Durée: 13 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
The Art of Deception
- Controlling the Human Element of Security
- Narrateur(s): Nick Sullivan
- Durée: 13 h et 41 min
- Date de publication: 2020-07-10
- Langue: Anglais
-
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- Auteur(s): Mike Chapple, David Seidl
- Narrateur(s): Ray Greenley
- Durée: 24 h et 52 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You'll explore general security concepts, threats, vulnerabilities, mitigations, security architecture and operations, as well as security program management and oversight.
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- Narrateur(s): Ray Greenley
- Durée: 24 h et 52 min
- Date de publication: 2024-09-03
- Langue: Anglais
-
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 30,69$ ou 1 crédit
Prix réduit: 30,69$ ou 1 crédit
-
-
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Auteur(s): Joseph Menn
- Narrateur(s): Jonathan Davis
- Durée: 8 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Hard to get into
- Écrit par Blair C. le 2019-11-06
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Narrateur(s): Jonathan Davis
- Durée: 8 h et 11 min
- Date de publication: 2019-06-04
- Langue: Anglais
-
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,24$ ou 1 crédit
Prix réduit: 25,24$ ou 1 crédit
-
-
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- Auteur(s): Ben Buchanan
- Narrateur(s): Christopher Grove
- Durée: 11 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
Very Informative
- Écrit par Geoff le 2024-09-07
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- Narrateur(s): Christopher Grove
- Durée: 11 h et 19 min
- Date de publication: 2020-06-30
- Langue: Anglais
-
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Auteur(s): Shashi Shekhar, Pamela Vold
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Billions of people around the globe use various applications of spatial computing daily - by using a ride-sharing app, GPS, social media check-ins, even Pokemon Go. Scientists and researchers use spatial computing to track diseases, map the bottom of the oceans, chart the behavior of endangered species, and create election maps in real time. Drones and driverless cars use a variety of spatial computing technologies. Spatial computing works by understanding the physical world, knowing and communicating our relation to places in that world, and navigating through those places.
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Date de publication: 2020-06-02
- Langue: Anglais
-
Billions of people around the globe use various applications of spatial computing daily-by using a ride-sharing app, GPS, the e911 system, social media check-ins, even Pokemon Go....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Auteur(s): Christopher Hadnagy
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Okay
- Écrit par AmazonShopper le 2024-03-04
-
Social Engineering, Second Edition
- The Science of Human Hacking
- Narrateur(s): Christopher Hadnagy
- Durée: 9 h et 28 min
- Date de publication: 2019-02-28
- Langue: Anglais
-
Renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Schneier on Security
- Auteur(s): Bruce Schneier, Ken Maxon
- Narrateur(s): Ken Maxon
- Durée: 11 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Presenting invaluable advice from the world's most famous computer security expert, this intensely listenable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay - figuratively and literally - when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, internet banking, sporting events, computers, and castles, this book is a must-listen for anyone who values security at any level.
-
Schneier on Security
- Narrateur(s): Ken Maxon
- Durée: 11 h et 18 min
- Date de publication: 2020-07-09
- Langue: Anglais
-
Presenting invaluable advice from the world's most famous computer security expert, this intensely listenable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Technocreep
- The Surrender of Privacy and the Capitalization of Intimacy
- Auteur(s): Thomas P. Keenan
- Narrateur(s): Thomas P. Keenan
- Durée: 9 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With security scares like the Heartbleed bug (which compromised even supposedly safe internet behemoths like Google and Yahoo!) becoming more commonplace, this book is a must-listen for anybody who values their privacy in a wired world.
-
-
beautiful and scary story about technology
- Écrit par Nataliya le 2023-01-05
-
Technocreep
- The Surrender of Privacy and the Capitalization of Intimacy
- Narrateur(s): Thomas P. Keenan
- Durée: 9 h et 31 min
- Date de publication: 2014-10-14
- Langue: Anglais
- Here is the definitive dissection of privacy-eroding and life-invading technologies, coming at you from governments, corporations, and the person next door....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,40$ ou 1 crédit
Prix réduit: 26,40$ ou 1 crédit
-
-
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Auteur(s): Kevin Mitnick, William L. Simon
- Narrateur(s): Ray Porter
- Durée: 13 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- Écrit par jesse b le 2022-05-20
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Narrateur(s): Ray Porter
- Durée: 13 h et 59 min
- Date de publication: 2011-08-15
- Langue: Anglais
- Kevin Mitnick was the most elusive computer break-in artist in history....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 24,14$ ou 1 crédit
Prix réduit: 24,14$ ou 1 crédit
-
-
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- Auteur(s): Lester Evans
- Narrateur(s): Michael Reaves
- Durée: 3 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention.... Do you create tons of accounts you will never again visit? Does your password contain a sequence of numbers, such as “123456”? Do you automatically click all links and download all email attachments coming from your friends? This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.
-
-
Absolutely Amazing for my first audiobook
- Écrit par Kelly H le 2021-10-28
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- Narrateur(s): Michael Reaves
- Durée: 3 h et 25 min
- Date de publication: 2019-01-10
- Langue: Anglais
-
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention.... Do you create tons of accounts you will never again visit? Does your password contain a sequence of numbers, such as “123456”? Find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Auteur(s): Cliff Stoll
- Narrateur(s): Will Damron
- Durée: 12 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
Excellent writing
- Écrit par The Diggerswife le 2024-07-18
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- Narrateur(s): Will Damron
- Durée: 12 h et 46 min
- Date de publication: 2020-01-31
- Langue: Anglais
-
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Social Engineering
- The Art of Human Hacking
- Auteur(s): Paul Wilson - foreword, Christopher Hadnagy
- Narrateur(s): A. T. Chandler
- Durée: 14 h et 52 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
-
Social Engineering
- The Art of Human Hacking
- Narrateur(s): A. T. Chandler
- Durée: 14 h et 52 min
- Date de publication: 2020-07-10
- Langue: Anglais
-
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-