Information Security
-
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Auteur(s): Mike Chapple, James Michael Stewart, Darril Gibson
- Narrateur(s): Tom Parks
- Durée: 65 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex study guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- Narrateur(s): Tom Parks
- Durée: 65 h et 38 min
- Date de publication: 2023-02-28
- Langue: Anglais
-
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 44,54$ ou 1 crédit
Prix réduit: 44,54$ ou 1 crédit
-
-
-
Certified Information Security Manager CISM Study Guide
- Auteur(s): Mike Chapple PhD CISM
- Narrateur(s): Daniel Henning
- Durée: 19 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job. Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further.
-
Certified Information Security Manager CISM Study Guide
- Narrateur(s): Daniel Henning
- Durée: 19 h et 21 min
- Date de publication: 2023-02-21
- Langue: Anglais
-
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 33,40$ ou 1 crédit
Prix réduit: 33,40$ ou 1 crédit
-
-
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Auteur(s): Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Date de publication: 2024-02-20
- Langue: Anglais
-
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
NIST Cybersecurity Framework (CSF) for Information Systems Security
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 8 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The NIST Cybersecurity Framework, intelligently designed to synchronize with top-tier industry practices, is a treasure trove for all cybersecurity enthusiasts, IT professionals, or organizational leaders determined to enhance their information systems security. This book, with its ability to translate complex concepts into accessible lessons, has the power to elevate beginners into adept cybersecurity practitioners.
-
NIST Cybersecurity Framework (CSF) for Information Systems Security
- Narrateur(s): Kim Pepper
- Série: NIST Cybersecurity Framework, Livre 1
- Durée: 8 h et 25 min
- Date de publication: 2023-08-09
- Langue: Anglais
-
The NIST Cybersecurity Framework, intelligently designed to synchronize with top-tier industry practices, is a treasure trove for all cybersecurity enthusiasts, IT professionals, or organizational leaders determined to enhance their information systems security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
A Vulnerable System
- The History of Information Security in the Computer Age
- Auteur(s): Andrew J. Stewart
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.
-
A Vulnerable System
- The History of Information Security in the Computer Age
- Narrateur(s): Rick Adamson
- Durée: 10 h et 15 min
- Date de publication: 2021-09-14
- Langue: Anglais
-
Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- Auteur(s): Gwen Bettwy, Mark Williams, Mike Beevers
- Narrateur(s): Gwen Bettwy
- Durée: 5 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- Narrateur(s): Gwen Bettwy
- Durée: 5 h et 55 min
- Date de publication: 2021-08-03
- Langue: Anglais
-
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
North Korea's Hidden Revolution
- How the Information Underground Is Transforming a Closed Society
- Auteur(s): Jieun Baek
- Narrateur(s): Caroline McLaughlin
- Durée: 7 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
One of the least understood countries in the world, North Korea has long been known for its repressive regime. Yet it is far from being an impenetrable black box. Media flows covertly into the country, and fault lines are appearing in the government's sealed informational borders. Drawing on deeply personal interviews with North Korean defectors from all walks of life, ranging from propaganda artists to diplomats, Jieun Baek tells the story of North Korea's information underground.
-
North Korea's Hidden Revolution
- How the Information Underground Is Transforming a Closed Society
- Narrateur(s): Caroline McLaughlin
- Durée: 7 h et 31 min
- Date de publication: 2016-11-15
- Langue: Anglais
- One of the least understood countries in the world, North Korea has long been known for its repressive regime. Yet it is far from being an impenetrable black box. Media flows covertly....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,92$ ou 1 crédit
Prix réduit: 18,92$ ou 1 crédit
-
-
-
The Kubark Counterintelligence Interrogation Manual
- Auteur(s): Central Intelligence Agency
- Narrateur(s): John Riddle
- Durée: 4 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Released by the Freedom of Information Act. This document is a thorough description of how the CIA recommends interrogating a subject. To get the information that is needed there is nothing withheld short of torture. For example in "Threats and Fears," the CIA authors note that "the threat of coercion usually weakens or destroys resistance more effectively than coercion itself. The threat to inflict pain, for example, can trigger fears more damaging than the immediate sensation of pain."
-
The Kubark Counterintelligence Interrogation Manual
- Narrateur(s): John Riddle
- Durée: 4 h et 13 min
- Date de publication: 2023-07-12
- Langue: Anglais
-
Released by the Freedom of Information Act. This document is a thorough description of how the CIA recommends interrogating a subject. To get the information that is needed there is nothing withheld short of torture....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 10,09$ ou 1 crédit
Prix réduit: 10,09$ ou 1 crédit
-
-
-
The Russian Understanding of War
- Blurring the Lines Between War and Peace
- Auteur(s): Oscar Jonsson
- Narrateur(s): Michael Page
- Durée: 7 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book analyzes the evolution of Russian military thought and how Russia's current thinking about war is reflected in recent crises. What Jonsson reveals is that Russia's conception of the very nature of war is now changing, as Russian elites see information warfare and political subversion as the most important ways to conduct contemporary war. Since information warfare and political subversion are below the traditional threshold of armed violence, this has blurred the boundaries between war and peace.
-
The Russian Understanding of War
- Blurring the Lines Between War and Peace
- Narrateur(s): Michael Page
- Durée: 7 h et 29 min
- Date de publication: 2020-10-27
- Langue: Anglais
-
This book analyzes the evolution of Russian military thought and how Russia's current thinking about war is reflected in recent crises. What Jonsson reveals is that Russian elites see information warfare and political subversion as the most important ways to conduct contemporary war....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 11 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application. Equip yourself with a dual weapon against cyber threats – a theoretical understanding and actionable strategies. Whether you're a cybersecurity novice or a seasoned expert, this 2-in-1 bundle is a must-have resource.
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- Narrateur(s): Kim Pepper
- Durée: 11 h et 43 min
- Date de publication: 2023-12-03
- Langue: Anglais
-
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
Active Measures
- The Secret History of Disinformation and Political Warfare
- Auteur(s): Thomas Rid
- Narrateur(s): Derek Perkins
- Durée: 14 h et 45 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We live in the age of disinformation - of organized deception. Spy agencies pour vast resources into hacking, leaking, and forging data, often with the goal of weakening the very foundation of liberal democracy: trust in facts. Thomas Rid, a renowned expert on technology and national security, was one of the first to sound the alarm, even before the 2016 election. But this is not new. The story of modern disinformation begins with the clash between communism and capitalism after the Russian Revolution.
-
-
Biased and partial analysis
- Écrit par A humble student le 2024-01-05
-
Active Measures
- The Secret History of Disinformation and Political Warfare
- Narrateur(s): Derek Perkins
- Durée: 14 h et 45 min
- Date de publication: 2020-04-21
- Langue: Anglais
-
This revelatory and dramatic history of disinformation traces the rise of secret organized deception operations from the interwar period to contemporary internet troll farms....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 32,04$ ou 1 crédit
Prix réduit: 32,04$ ou 1 crédit
-
-
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Auteur(s): Steve Watkins
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022.
-
ISO/IEC 27001: 2022
- An Introduction to Information Security and the ISMS Standard
- Narrateur(s): Steve G Watkins
- Durée: 1 h
- Date de publication: 2023-09-06
- Langue: Anglais
-
Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO 27001: 2022–An Introduction to Information Security and the ISMS Standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001: 2022....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
An Introduction to Information Security and ISO 27001 (2013): A Pocket Guide
- Auteur(s): Steve Watkins
- Narrateur(s): Andy Cresswell
- Durée: 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It is estimated that standard computer-based defense systems catch only 25 percent of malware attacks. Do you know the risks you’re running online? Are you protected? An Introduction to Hacking and Crimeware answers your concerns and provides a foundation-level overview of the dark world of cybercrime. This is a comprehensive guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe, enabling you to focus on your core activities without fear of attack.
-
An Introduction to Information Security and ISO 27001 (2013): A Pocket Guide
- Narrateur(s): Andy Cresswell
- Durée: 53 min
- Date de publication: 2018-12-06
- Langue: Anglais
-
An Introduction to Hacking and Crimeware is a comprehensive pocket guide to more serious online threats. Knowledge of these threats will help you understand how to ensure that your computer systems are protected and make sure that your business is safe....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
The Privacy Fallacy
- Harm and Power in the Information Economy
- Auteur(s): Ignacio Cofone
- Narrateur(s): Alex Freeman
- Durée: 9 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Our data is besieged daily in the information economy, leading to hidden AI harms. Companies can do this because our laws are built on outdated ideas that trap lawmakers, regulators, and courts into wrong assumptions, resulting in ineffective approaches to one of the most pressing concerns of our generation. Drawing on behavioral science, social data science, and economics, this book dispels enduring misconceptions about AI-driven interactions. Its exploration offers a view of why current regulations fail to protect us against digital harms, particularly those created by AI.
-
The Privacy Fallacy
- Harm and Power in the Information Economy
- Narrateur(s): Alex Freeman
- Durée: 9 h et 39 min
- Date de publication: 2024-10-02
- Langue: Anglais
-
Our data is besieged daily in the information economy, leading to hidden AI harms.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Information Technology and Military Power
- Cornell Studies in Security Affairs
- Auteur(s): Jon R. Lindsay
- Narrateur(s): Kelly Libatique
- Durée: 11 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Militaries with state-of-the-art information technology sometimes bog down in confusing conflicts. To understand why, it is important to understand the micro-foundations of military power in the information age - and this is exactly what Jon R. Lindsay's Information Technology and Military Power gives us. As Lindsay shows, digital systems now mediate almost every effort to gather, store, display, analyze, and communicate information in military organizations. He highlights how personnel now struggle with their own information systems, as much as with the enemy.
-
Information Technology and Military Power
- Cornell Studies in Security Affairs
- Narrateur(s): Kelly Libatique
- Durée: 11 h et 30 min
- Date de publication: 2022-02-09
- Langue: Anglais
-
Militaries with state-of-the-art information technology sometimes bog down in confusing conflicts. To understand why, it is important to understand the micro-foundations of military power in the information age - and this is exactly what Jon R. Lindsay gives us, in this audiobook....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
Beginners Guide to Hacking and Cyber Security: Written by former Army Cyber Security Analyst and Federal Agent
- Information Technology by Sam
- Auteur(s): Samuel Castro
- Narrateur(s): Devon Michael Scott
- Durée: 2 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Welcome to the first and only book you will ever need on the topic of cyber law and cyber security. learn hacking techniques, cyber law, and white hat operations. Perfect for Beginners: If you’re brand new or an expert in cyber security, you’ll still find this guide a solid purchase to add to your skill set, develop new skills and techniques, or revamp old ones and sharpen yourself with cyber security and cyber law.
-
Beginners Guide to Hacking and Cyber Security: Written by former Army Cyber Security Analyst and Federal Agent
- Information Technology by Sam
- Narrateur(s): Devon Michael Scott
- Durée: 2 h et 33 min
- Date de publication: 2019-06-13
- Langue: Anglais
-
Welcome to the first and only book you will ever need on the topic of cyber law and cyber security. learn hacking techniques, cyber law, and white hat operations....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- Auteur(s): Phillip L. Wylie, Kim Crawley
- Narrateur(s): Matthew Josdal
- Durée: 6 h et 22 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.
-
The Pentester BluePrint
- Starting a Career as an Ethical Hacker
- Narrateur(s): Matthew Josdal
- Durée: 6 h et 22 min
- Date de publication: 2021-03-30
- Langue: Anglais
-
Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,81$ ou 1 crédit
Prix réduit: 17,81$ ou 1 crédit
-
-
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- Auteur(s): Razi Rais, Christina Morillo, Evan Gilman, Autres
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
-
Zero Trust Networks (2nd Edition)
- Building Secure Systems in Untrusted Networks
- Narrateur(s): Mike Chamberlain
- Durée: 12 h et 5 min
- Date de publication: 2024-06-04
- Langue: Anglais
-
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
CC Certified in Cybersecurity All-in-One Exam Guide
- Auteur(s): Jordan Genung, Steven Bennett
- Narrateur(s): Mike Chamberlain
- Durée: 11 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Take the Certified in Cybersecurity exam from (ISC)2 with confidence using the information contained in this comprehensive study guide. Written by a pair of cybersecurity experts and successful trainers, CC Certified in Cybersecurity All-in-One Exam Guide offers background material, detailed examples, and over 200 practice questions.
-
CC Certified in Cybersecurity All-in-One Exam Guide
- Narrateur(s): Mike Chamberlain
- Durée: 11 h et 42 min
- Date de publication: 2024-07-09
- Langue: Anglais
-
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,30$ ou 1 crédit
Prix réduit: 26,30$ ou 1 crédit
-
-
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Auteur(s): Sean D. Mack
- Narrateur(s): William Sarris
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The DevSecOps Playbook: Deliver Continuous Security at Speed, the chief information and information security officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You'll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You'll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks.
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Narrateur(s): William Sarris
- Durée: 7 h et 9 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
An essential and up-to-date guide to DevSecOps....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-