Information Security
-
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Auteur(s): Mike Chapple, James Michael Stewart, Darril Gibson
- Narrateur(s): Tom Parks
- Durée: 65 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Narrateur(s): Tom Parks
- Durée: 65 h et 38 min
- Date de publication: 2023-02-28
- Langue: Anglais
-
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 44,54$ ou 1 crédit
Prix réduit: 44,54$ ou 1 crédit
-
-
-
Certified Information Security Manager CISM Study Guide
- Auteur(s): Mike Chapple PhD CISM
- Narrateur(s): Daniel Henning
- Durée: 19 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job. Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further.
-
Certified Information Security Manager CISM Study Guide
- Narrateur(s): Daniel Henning
- Durée: 19 h et 21 min
- Date de publication: 2023-02-21
- Langue: Anglais
-
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 33,40$ ou 1 crédit
Prix réduit: 33,40$ ou 1 crédit
-
-
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Auteur(s): Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Date de publication: 2024-02-20
- Langue: Anglais
-
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Beginners Guide to Hacking and Cyber Security: Written by former Army Cyber Security Analyst and Federal Agent
- Information Technology by Sam
- Auteur(s): Samuel Castro
- Narrateur(s): Devon Michael Scott
- Durée: 2 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Welcome to the first and only book you will ever need on the topic of cyber law and cyber security. learn hacking techniques, cyber law, and white hat operations. Perfect for Beginners: If you’re brand new or an expert in cyber security, you’ll still find this guide a solid purchase to add to your skill set, develop new skills and techniques, or revamp old ones and sharpen yourself with cyber security and cyber law.
-
Beginners Guide to Hacking and Cyber Security: Written by former Army Cyber Security Analyst and Federal Agent
- Information Technology by Sam
- Narrateur(s): Devon Michael Scott
- Durée: 2 h et 33 min
- Date de publication: 2019-06-13
- Langue: Anglais
-
Welcome to the first and only book you will ever need on the topic of cyber law and cyber security. learn hacking techniques, cyber law, and white hat operations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
NIST Cybersecurity Framework (CSF) for Information Systems Security
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 8 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The NIST Cybersecurity Framework, intelligently designed to synchronize with top-tier industry practices, is a treasure trove for all cybersecurity enthusiasts, IT professionals, or organizational leaders determined to enhance their information systems security. This book, with its ability to translate complex concepts into accessible lessons, has the power to elevate beginners into adept cybersecurity practitioners.
-
NIST Cybersecurity Framework (CSF) for Information Systems Security
- Narrateur(s): Kim Pepper
- Série: NIST Cybersecurity Framework, Livre 1
- Durée: 8 h et 25 min
- Date de publication: 2023-08-09
- Langue: Anglais
-
The NIST Cybersecurity Framework, intelligently designed to synchronize with top-tier industry practices, is a treasure trove for all cybersecurity enthusiasts, IT professionals, or organizational leaders determined to enhance their information systems security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- Auteur(s): Gwen Bettwy, Mark Williams, Mike Beevers
- Narrateur(s): Gwen Bettwy
- Durée: 5 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- Narrateur(s): Gwen Bettwy
- Durée: 5 h et 55 min
- Date de publication: 2021-08-03
- Langue: Anglais
-
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- Auteur(s): Phillip L. Wylie, Kim Crawley
- Narrateur(s): Matthew Josdal
- Durée: 6 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- Narrateur(s): Matthew Josdal
- Durée: 6 h et 22 min
- Date de publication: 2021-03-30
- Langue: Anglais
-
Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,81$ ou 1 crédit
Prix réduit: 17,81$ ou 1 crédit
-
-
-
A Vulnerable System
- The History of Information Security in the Computer Age
- Auteur(s): Andrew J. Stewart
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
A Vulnerable System
- The History of Information Security in the Computer Age
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Date de publication: 2021-09-14
- Langue: Anglais
-
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
The Russian Understanding of War
- Blurring the Lines Between War and Peace
- Auteur(s): Oscar Jonsson
- Narrateur(s): Michael Page
- Durée: 7 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book analyzes the evolution of Russian military thought and how Russia's current thinking about war is reflected in recent crises. What Jonsson reveals is that Russia's conception of the very nature of war is now changing, as Russian elites see information warfare and political subversion as the most important ways to conduct contemporary war. Since information warfare and political subversion are below the traditional threshold of armed violence, this has blurred the boundaries between war and peace.
-
The Russian Understanding of War
- Blurring the Lines Between War and Peace
- Narrateur(s): Michael Page
- Durée: 7 h et 29 min
- Date de publication: 2020-10-27
- Langue: Anglais
-
This book analyzes the evolution of Russian military thought and how Russia's current thinking about war is reflected in recent crises. What Jonsson reveals is that Russian elites see information warfare and political subversion as the most important ways to conduct contemporary war....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
North Korea's Hidden Revolution
- How the Information Underground Is Transforming a Closed Society
- Auteur(s): Jieun Baek
- Narrateur(s): Caroline McLaughlin
- Durée: 7 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
One of the least understood countries in the world, North Korea has long been known for its repressive regime. Yet it is far from being an impenetrable black box. Media flows covertly into the country, and fault lines are appearing in the government's sealed informational borders. Drawing on deeply personal interviews with North Korean defectors from all walks of life, ranging from propaganda artists to diplomats, Jieun Baek tells the story of North Korea's information underground.
-
North Korea's Hidden Revolution
- How the Information Underground Is Transforming a Closed Society
- Narrateur(s): Caroline McLaughlin
- Durée: 7 h et 31 min
- Date de publication: 2016-11-15
- Langue: Anglais
- One of the least understood countries in the world, North Korea has long been known for its repressive regime. Yet it is far from being an impenetrable black box. Media flows covertly....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,92$ ou 1 crédit
Prix réduit: 18,92$ ou 1 crédit
-
-
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 11 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application. Equip yourself with a dual weapon against cyber threats – a theoretical understanding and actionable strategies. Whether you're a cybersecurity novice or a seasoned expert, this 2-in-1 bundle is a must-have resource.
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- Narrateur(s): Kim Pepper
- Durée: 11 h et 43 min
- Date de publication: 2023-12-03
- Langue: Anglais
-
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
The Kubark Counterintelligence Interrogation Manual
- Auteur(s): Central Intelligence Agency
- Narrateur(s): John Riddle
- Durée: 4 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Released by the Freedom of Information Act. This document is a thorough description of how the CIA recommends interrogating a subject. To get the information that is needed there is nothing withheld short of torture. For example in "Threats and Fears," the CIA authors note that "the threat of coercion usually weakens or destroys resistance more effectively than coercion itself. The threat to inflict pain, for example, can trigger fears more damaging than the immediate sensation of pain."
-
The Kubark Counterintelligence Interrogation Manual
- Narrateur(s): John Riddle
- Durée: 4 h et 13 min
- Date de publication: 2023-07-12
- Langue: Anglais
-
Released by the Freedom of Information Act. This document is a thorough description of how the CIA recommends interrogating a subject. To get the information that is needed there is nothing withheld short of torture....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 10,09$ ou 1 crédit
Prix réduit: 10,09$ ou 1 crédit
-
-
-
An Introduction to Information Security and ISO 27001 (2013): A Pocket Guide
- Auteur(s): Steve Watkins
- Narrateur(s): Andy Cresswell
- Durée: 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It is estimated that standard computer-based defense systems catch only 25 percent of malware attacks. Do you know the risks you’re running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. This is a comprehensive guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack.
-
An Introduction to Information Security and ISO 27001 (2013): A Pocket Guide
- Narrateur(s): Andy Cresswell
- Durée: 53 min
- Date de publication: 2018-12-06
- Langue: Anglais
-
An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Auteur(s): Steve Watkins
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022.
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Date de publication: 2023-09-06
- Langue: Anglais
-
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Privacy Fallacy
- Harm and Power in the Information Economy
- Auteur(s): Ignacio Cofone
- Narrateur(s): Alex Freeman
- Durée: 9 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Our data is besieged daily in the information economy, leading to hidden AI harms. Companies can do this because our laws are built on outdated ideas that trap lawmakers, regulators, and courts into wrong assumptions, resulting in ineffective approaches to one of the most pressing concerns of our generation. Drawing on behavioral science, social data science, and economics, this book dispels enduring misconceptions about AI-driven interactions. Its exploration offers a view of why current regulations fail to protect us against digital harms, particularly those created by AI.
-
The Privacy Fallacy
- Harm and Power in the Information Economy
- Narrateur(s): Alex Freeman
- Durée: 9 h et 39 min
- Date de publication: 2024-10-02
- Langue: Anglais
-
Our data is besieged daily in the information economy, leading to hidden AI harms.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Of Privacy and Power
- The Transatlantic Struggle over Freedom and Security
- Auteur(s): Henry Farrell, Abraham L. Newman
- Narrateur(s): Christopher Grove
- Durée: 8 h et 52 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. This means that states' jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics, have regulated privacy and security, and how their agreements and disputes have reshaped the transatlantic relationship.
-
Of Privacy and Power
- The Transatlantic Struggle over Freedom and Security
- Narrateur(s): Christopher Grove
- Durée: 8 h et 52 min
- Date de publication: 2019-04-02
- Langue: Anglais
-
We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management. While the official ISO 27001:2022 standard provides a concise overview, it often leaves readers craving more detailed insights. At a mere 20 pages and a price tag of 135 EURO, it may not offer the depth and clarity you need.
-
ISO 27001
- 2022 Information Security Management System Guide (ISO 27000 Information Security Management)
- Narrateur(s): Kim Pepper
- Durée: 3 h et 2 min
- Date de publication: 2024-05-28
- Langue: Anglais
-
Are you struggling to navigate the complexities of the ISO 27001:2022 standard? Look no further! This comprehensive guide, written by renowned cybersecurity expert Bruce Brown, CISSP, CGRC, is your ultimate companion to mastering the world of information security management.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Active Measures
- The Secret History of Disinformation and Political Warfare
- Auteur(s): Thomas Rid
- Narrateur(s): Derek Perkins
- Durée: 14 h et 45 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We live in the age of disinformation - of organized deception. Spy agencies pour vast resources into hacking, leaking, and forging data, often with the goal of weakening the very foundation of liberal democracy: trust in facts. Thomas Rid, a renowned expert on technology and national security, was one of the first to sound the alarm, even before the 2016 election. But this is not new. The story of modern disinformation begins with the clash between communism and capitalism after the Russian Revolution.
-
-
Biased and partial analysis
- Écrit par A humble student le 2024-01-05
-
Active Measures
- The Secret History of Disinformation and Political Warfare
- Narrateur(s): Derek Perkins
- Durée: 14 h et 45 min
- Date de publication: 2020-04-21
- Langue: Anglais
-
This revelatory and dramatic history of disinformation traces the rise of secret organized deception operations from the interwar period to contemporary internet troll farms....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 32,14$ ou 1 crédit
Prix réduit: 32,14$ ou 1 crédit
-
-
-
Small Wars, Big Data
- The Information Revolution in Modern Conflict
- Auteur(s): Eli Berman, Joseph H. Felter, Jacob N. Shapiro, Autres
- Narrateur(s): John McLain
- Durée: 13 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Small Wars, Big Data provides groundbreaking perspectives for how small wars can be better strategized and favorably won to the benefit of the local population.
-
Small Wars, Big Data
- The Information Revolution in Modern Conflict
- Narrateur(s): John McLain
- Durée: 13 h et 53 min
- Date de publication: 2018-07-10
- Langue: Anglais
-
Small Wars, Big Data provides groundbreaking perspectives for how small wars can be better strategized and favorably won to the benefit of the local population....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 33,40$ ou 1 crédit
Prix réduit: 33,40$ ou 1 crédit
-
-
-
Underground Storage Vaults: Protecting Priceless Information
- High Security
- Auteur(s): Kaitlyn Duling
- Narrateur(s): uncredited
- Durée: 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
How can important information and valuable items be kept safe as years pass? Many of these items are stored in underground vaults, including recordings and photos from U.S. history, important documents, and more. Locks, guards, secret passwords, and technology all play a part in the protection of the items.
-
Underground Storage Vaults: Protecting Priceless Information
- High Security
- Narrateur(s): uncredited
- Durée: 6 min
- Date de publication: 2024-04-24
- Langue: Anglais
-
How can important information and valuable items be kept safe as years pass? Many of these items are stored in underground vaults, including recordings and photos from U.S. history, important documents, and more.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,07$ ou 1 crédit
Prix réduit: 8,07$ ou 1 crédit
-