Computer Security
-
-
Secret Empire
- Eisenhower, CIA, and the Hidden Story of America's Space Espionage
- Auteur(s): Philip Taubman
- Narrateur(s): Michael Prichard
- Durée: 15 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
During the early and most dangerous years of the cold war, a handful of Americans, led by President Dwight D. Eisenhower, revolutionized spying and warfare. In great secrecy and beyond the prying eyes of Congress and the press, they built exotic new machines that opened up the Soviet Union to surveillance and protected the United States from surprise nuclear attack. Secret Empire is the dramatic story of these men and their inventions, told in full for the first time.
-
Secret Empire
- Eisenhower, CIA, and the Hidden Story of America's Space Espionage
- Narrateur(s): Michael Prichard
- Durée: 15 h et 40 min
- Date de publication: 2004-02-26
- Langue: Anglais
- During the early and most dangerous years of the cold war, a handful of Americans, led by President Dwight D. Eisenhower, revolutionized spying and warfare....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,05$ ou 1 crédit
Prix réduit: 25,05$ ou 1 crédit
-
-
-
NIST 800 Control Families in Each RMF Step (NIST 800 Cybersecurity)
- RMF ISSO: NIST 800-53 Controls, Book 2
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 4 h et 26 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process. It is written by someone in the field in layman's terms, with practical use in mind. This book is not a replacement for the NIST 800 special publications. It is a supplemental resource that will give context and meaning to the controls for organizations and cybersecurity professionals tasked with interpreting the security controls.
-
NIST 800 Control Families in Each RMF Step (NIST 800 Cybersecurity)
- RMF ISSO: NIST 800-53 Controls, Book 2
- Narrateur(s): Frank Block
- Série: NIST 800 Cybersecurity, Livre 2
- Durée: 4 h et 26 min
- Date de publication: 2022-08-11
- Langue: Anglais
-
This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process. It is written by someone in the field in layman's terms, with practical use in mind....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,24$ ou 1 crédit
Prix réduit: 25,24$ ou 1 crédit
-
-
-
The Mysterious Affair at Olivetti
- IBM, the CIA, and the Cold War Conspiracy to Shut Down Production of the World's First Desktop Computer
- Auteur(s): Meryle Secrest
- Narrateur(s): Susan Denaker
- Durée: 11 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The never-before-told true account of the design and development of the first desktop computer by the world's most famous high-styled typewriter company, more than a decade before the arrival of the Osborne 1, the Apple 1, the first Intel microprocessor, and IBM's PC5150.
-
The Mysterious Affair at Olivetti
- IBM, the CIA, and the Cold War Conspiracy to Shut Down Production of the World's First Desktop Computer
- Narrateur(s): Susan Denaker
- Durée: 11 h et 27 min
- Date de publication: 2019-11-05
- Langue: Anglais
-
The never-before-told true account of the design and development of the first desktop computer by the world's most famous high-styled typewriter company, more than a decade before the arrival of the Osborne 1, the Apple 1, the first Intel microprocessor, and IBM's PC5150....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,22$ ou 1 crédit
Prix réduit: 26,22$ ou 1 crédit
-
-
-
NFT for Beginners
- An Essential Guide to Understanding and Investing in Non-fungible Tokens and Crypto Art
- Auteur(s): Donn Newman
- Narrateur(s): Eric Burr
- Durée: 3 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you’re confused about the recent surge of crypto art and want to learn more about NFTs and their market, look no further! Have you ever wondered what the deal is with crypto art? Ever heard the term NFT and wondered what that could possibly mean? Do you feel intimidated by this new technology, more so because you’re barely struggling to understand Bitcoin and Ethereum? Are you a creative person looking to get into the crypto art scene? Then this audiobook is just what you need.
-
NFT for Beginners
- An Essential Guide to Understanding and Investing in Non-fungible Tokens and Crypto Art
- Narrateur(s): Eric Burr
- Durée: 3 h et 42 min
- Date de publication: 2022-05-17
- Langue: Anglais
-
If you’re confused about the recent surge of crypto art and want to learn more about NFTs and their market, look no further! Have you ever wondered what the deal is with crypto art? Ever heard the term NFT and wondered what that could possibly mean? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 15,10$ ou 1 crédit
Prix réduit: 15,10$ ou 1 crédit
-
-
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- Auteur(s): Peter Aiken, Todd Harbour
- Narrateur(s): Susan Hanfield
- Durée: 9 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance. Our Digital Civics Framework presents a guide to increasing the data literacy of billions of citizens. We outline the data knowledge that society needs and propose exercises that will help citizens interact productively within a data-driven society.
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- Narrateur(s): Susan Hanfield
- Durée: 9 h et 43 min
- Date de publication: 2022-05-16
- Langue: Anglais
-
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 3 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
All organizations face a broad array of risks, including cybersecurity risk. For federal agencies, the Office of Management and Budget (OMB) Circular A-11 defines risk as “the effect of uncertainty on objectives”. An organization’s mission and business objectives can be impacted by such effects, and must be managed at various levels within the organization. This report highlights aspects of cybersecurity risk management (CSRM) inherent to enterprises, organizations, and systems.
-
Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management
- Narrateur(s): Tom Brooks
- Durée: 3 h et 29 min
- Date de publication: 2021-12-01
- Langue: Anglais
-
All organizations face a broad array of risks, including cybersecurity risk. For federal agencies, the Office of Management and Budget (OMB) Circular A-11 defines risk as “the effect of uncertainty on objectives”. An organization’s mission and business objectives can be impacted....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
NIST Cybersecurity & Privacy Program
- Auteur(s): National Institute of Standards and Technology (NIST)
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public. Our work ranges from specific information that can be put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.
-
NIST Cybersecurity & Privacy Program
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Date de publication: 2021-07-19
- Langue: Anglais
-
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Confessions of a CIA Spy
- The Art of Human Hacking
- Auteur(s): Peter Warmka
- Narrateur(s): Gary Williams
- Durée: 3 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies that he and other threat actors use to breach the security of their targets, whether they’re high-profile individuals or entire organizations.
-
Confessions of a CIA Spy
- The Art of Human Hacking
- Narrateur(s): Gary Williams
- Durée: 3 h et 42 min
- Date de publication: 2021-03-02
- Langue: Anglais
-
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies to breach the security of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Well Aware
- Master the Nine Cybersecurity Habits to Protect Your Future
- Auteur(s): George Finney
- Narrateur(s): Brett Barry
- Durée: 6 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Well Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it’s a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered - literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception - drawn from knowledge the author has acquired during two decades of experience in cybersecurity. By implementing these habits and changing our behaviors, we can combat most security problems.
-
Well Aware
- Master the Nine Cybersecurity Habits to Protect Your Future
- Narrateur(s): Brett Barry
- Durée: 6 h et 33 min
- Date de publication: 2020-12-07
- Langue: Anglais
-
Well Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it’s a people problem....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,15$ ou 1 crédit
Prix réduit: 20,15$ ou 1 crédit
-
-
-
The Cyber Blueprint
- Quickly Learn How to Become a Cybersecurity Specialist, Develop the Skills Needed for Immediate Employment, and Create a Road Map for a Lucrative Career
- Auteur(s): André Edmond
- Narrateur(s): Scotty Kwas
- Durée: 5 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Have you been struggling to find a guide that explains how to get started in cybersecurity? Does your lack of experience make it difficult to get your first job? The path to cybersecurity excellent can be daunting, especially when you're left to navigate it alone. Countless individuals harbor the same ambition as you, yet they grapple with the same pain points. The lack of a guiding hand leaves them stranded, not knowing which doors to knock on or which paths to tread.
-
The Cyber Blueprint
- Quickly Learn How to Become a Cybersecurity Specialist, Develop the Skills Needed for Immediate Employment, and Create a Road Map for a Lucrative Career
- Narrateur(s): Scotty Kwas
- Durée: 5 h et 51 min
- Date de publication: 2024-06-11
- Langue: Anglais
-
The path to cybersecurity excellent can be daunting, especially when you're left to navigate it alone. Countless individuals harbor the same ambition as you, yet they grapple with the same pain points.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- Auteur(s): George Galdorisi, Sam J. Tangredi, Robert O. Work - foreword by
- Narrateur(s): Lyle Blaker
- Durée: 7 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
-
Algorithms of Armageddon
- The Impact of Artificial Intelligence on Future Wars
- Narrateur(s): Lyle Blaker
- Durée: 7 h et 38 min
- Date de publication: 2024-06-25
- Langue: Anglais
-
Neither a protest against AI, nor a speculative work on how AI could replace humans, Algorithms of Armageddon provides a time-critical understanding of why AI is being implemented through state weaponization, the realities for the global power balance, and more importantly, U.S. national security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
The Sentinel Squad
- In the Shadows of a Cyber Hacker
- Auteur(s): Robert L Cogmon, Robert L. Cogmon
- Narrateur(s): Dalan Decker
- Durée: 2 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Digital Heroism: Cyber security experts are portrayed in the manuscript as contemporary heroes who bravely, shrewdly, and strategically defeat cyberattacks. Characters such as Deja Digital serve as examples of the value of technical know-how and inventiveness in building defenses against cyberattacks.
-
The Sentinel Squad
- In the Shadows of a Cyber Hacker
- Narrateur(s): Dalan Decker
- Durée: 2 h et 46 min
- Date de publication: 2024-05-29
- Langue: Anglais
-
Digital Heroism: Cyber security experts are portrayed in the manuscript as contemporary heroes who bravely, shrewdly, and strategically defeat cyberattacks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process.
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Narrateur(s): Tom Brooks
- Durée: 1 h et 55 min
- Date de publication: 2023-10-10
- Langue: Anglais
-
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
- Auteur(s): National Security Agency, CISA
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to highlight the most common cybersecurity misconfigurations in large organizations, and detail the tactics, techniques, and procedures (TTPs) actors use to exploit these misconfigurations. Through NSA and CISA Red and Blue team assessments, as well as through the activities of NSA and CISA Hunt and Incident Response teams, the agencies identified the following 10 most common network misconfigurations.
-
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Date de publication: 2023-10-19
- Langue: Anglais
-
The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to highlight the most common cybersecurity misconfigurations in large organizations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Bitcoin: The Ultimate A - Z of Profitable Bitcoin Trading & Mining Guide Exposed
- The Blokehead Success Series
- Auteur(s): The Blokehead
- Narrateur(s): Chris Brinkley
- Durée: 56 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
How does the bitcoin protocol work? A person cannot mix indefinite bitcoins. The bitcoin protocol states that there will only be 21 million bitcoins to be produced by the miners. These bitcoins will then be subdivided into smaller bits. The smallest bit is called "satoshi" named after the bitcoin founder and the divisible amount is 100 millionth of a bitcoin. Bitcoin currency is based on mathematical formulas unlike our conventional currency that is based on gold and silver.
-
Bitcoin: The Ultimate A - Z of Profitable Bitcoin Trading & Mining Guide Exposed
- The Blokehead Success Series
- Narrateur(s): Chris Brinkley
- Durée: 56 min
- Date de publication: 2014-12-12
- Langue: Anglais
- How does the bitcoin protocol work? A person cannot mix indefinite bitcoins. The bitcoin protocol states that there will only be 21 million bitcoins to be produced by the miners....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 5,22$ ou 1 crédit
Prix réduit: 5,22$ ou 1 crédit
-
-
-
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
- Auteur(s): Attila Kovacs
- Narrateur(s): J. Matyas
- Durée: 3 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you want to learn how to build a pen test lab, but you don’t know where to start? Do you want a practical book that explains step by step how to get going? Do you want to become an ethical hacker or pen tester? If the answer is yes to the above questions, this audiobook is for you. Buy this audiobook now, and get started today!
-
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
- Narrateur(s): J. Matyas
- Durée: 3 h et 4 min
- Date de publication: 2019-09-04
- Langue: Anglais
-
Do you want to learn how to build a pen test lab, but you don’t know where to start? Do you want a practical book that explains step by step how to get going? Do you want to become an ethical hacker or pen tester? If the answer is yes to the above questions, this audiobook is for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 14,62$ ou 1 crédit
Prix réduit: 14,62$ ou 1 crédit
-
-
-
The People vs Tech
- How the Internet Is Killing Democracy (and How We Save It)
- Auteur(s): Jamie Bartlett
- Narrateur(s): Sandro Monetti
- Durée: 5 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Internet was meant to set us free. But have we unwittingly handed too much away to shadowy powers behind a wall of code, all manipulated by a handful of Silicon Valley utopians, ad men, and venture capitalists? And, in light of recent data breach scandals around companies like Facebook and Cambridge Analytica, what does that mean for democracy, our delicately balanced system of government that was created long before big data, total information, and artificial intelligence? In this urgent polemic, Jamie Bartlett argues that through our unquestioning embrace of big tech, the building blocks of democracy are slowly being removed.
-
-
Doesn't load. This book won't play on my device at
- Écrit par Utilisateur anonyme le 2018-08-02
-
The People vs Tech
- How the Internet Is Killing Democracy (and How We Save It)
- Narrateur(s): Sandro Monetti
- Durée: 5 h et 5 min
- Date de publication: 2018-04-06
- Langue: Anglais
-
The Internet was meant to set us free. But have we unwittingly handed too much away to shadowy powers behind a wall of code, all manipulated by a handful of Silicon Valley utopians, ad men, and venture capitalists? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,48$ ou 1 crédit
Prix réduit: 17,48$ ou 1 crédit
-
-
-
Tor and the Dark Net
- Learn to Avoid NSA Spying and Become Anonymous Online
- Auteur(s): Jared Norton
- Narrateur(s): Ross Ticknor
- Durée: 1 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Use this information to avoid being spied by the government today! If you've ever heard outrageous stories about online illegal drug stores, hitmen for hire, celebrities busted for child porn, mad scientific experiments, and Illuminati rituals, you've probably heard of the "dark web", alternatively called the deep web. But have you ever wondered if these stories are true? What is the deep web or dark web, exactly?
-
Tor and the Dark Net
- Learn to Avoid NSA Spying and Become Anonymous Online
- Narrateur(s): Ross Ticknor
- Durée: 1 h et 29 min
- Date de publication: 2016-12-13
- Langue: Anglais
- Use this information to avoid being spied by the government today....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
Data for the People
- How to Make Our Post-Privacy Economy Work for You
- Auteur(s): Andreas S. Weigend
- Narrateur(s): Barry Abrams
- Durée: 10 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every time we Google something, Facebook someone, or just carry a phone, we create data. Yet, we do not benefit from this wealth of information as much as we should. Andreas Weigend - an advisor to Alibaba, BMW, Hyatt, MasterCard, and Lufthansa, among others - wants to change that. In Data for the People, he proposes six basic data rights that we all need to make better decisions. Big data is here to stay. The time has come to shift the balance of power back to the individual.
-
Data for the People
- How to Make Our Post-Privacy Economy Work for You
- Narrateur(s): Barry Abrams
- Durée: 10 h et 27 min
- Date de publication: 2017-01-31
- Langue: Anglais
- Every time we Google something, Facebook someone, or just carry a phone, we create data. Yet, we do not benefit from this wealth of information as much as we should....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-