Internet Security
-
-
Senior Cyber
- Best Security Practices for Your Golden Years
- Auteur(s): Scott N. Schober, Craig W. Schober
- Narrateur(s): Alan Sklar
- Durée: 3 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
From the basics of the internet to the fight for healthcare privacy and security that is so critical to our aging population, Senior Cyber offers simple advice and expertise for all levels of internet experience. Whether you are a parent, grandparent, great-grandparent, or the son or daughter of one, this book is designed with your concerns in mind. Practical cybersecurity advice and examples affecting seniors put Senior Cyber atop any listening list for those helping others or themselves to stay cyber safe.
-
Senior Cyber
- Best Security Practices for Your Golden Years
- Narrateur(s): Alan Sklar
- Durée: 3 h et 51 min
- Date de publication: 2021-03-24
- Langue: Anglais
-
From the basics of the internet to the fight for healthcare privacy and security that is so critical to our aging population, Senior Cyber offers simple advice and expertise for all levels of internet experience....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cybersecurity
- The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
- Auteur(s): Trust Genics
- Narrateur(s): Leon Tietz
- Durée: 3 h et 48 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk. At an individual level, a cybersecurity attack can result in everything from identity theft to extortion attempts, to the loss of important data like family photos. However, there are simple things you can do to protect yourself, your family, and your work.
-
Cybersecurity
- The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
- Narrateur(s): Leon Tietz
- Durée: 3 h et 48 min
- Date de publication: 2020-03-07
- Langue: Anglais
-
Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,08$ ou 1 crédit
Prix réduit: 9,08$ ou 1 crédit
-
-
-
Kali Linux: Testing Your Network
- How to Test Infrastructure Security with Security Testing and Penetration Testing
- Auteur(s): Frank Eltrinos
- Narrateur(s): Rudy Norman
- Durée: 3 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Increasingly, hackers are becoming a bigger problem for both businesses and individuals. If they decide to target your device, you could be locked out of your own systems or lose valuable information. Sadly, many people don’t know how to protect their networks, leaving them open to the stress and anxiety that these attacks can cause. Thankfully, you can learn the skills required to secure your network. This comprehensive audiobook will take you through everything you need to know.
-
Kali Linux: Testing Your Network
- How to Test Infrastructure Security with Security Testing and Penetration Testing
- Narrateur(s): Rudy Norman
- Durée: 3 h et 39 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
Increasingly, hackers are becoming a bigger problem for both businesses and individuals. If they decide to target your device, you could be locked out of your own systems or lose valuable information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Hacking
- Hacking for Beginners, Basic Security & How to Hack
- Auteur(s): Jacob Hatcher
- Narrateur(s): Luke Rounda
- Durée: 3 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government. This book lists the various ways hackers can breach the security of an individual or an organization's data and network. Its information is for learning purposes only, and the hacking techniques should not be tried because it is a crime to hack someone's personal details without his or her consent.
-
Hacking
- Hacking for Beginners, Basic Security & How to Hack
- Narrateur(s): Luke Rounda
- Durée: 3 h et 34 min
- Date de publication: 2017-01-06
- Langue: Anglais
- Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,78$ ou 1 crédit
Prix réduit: 19,78$ ou 1 crédit
-
-
-
Hacking
- Penetration Testing, Basic Security, and How To Hack
- Auteur(s): Justin Hatmaker
- Narrateur(s): Richard D. Hurd
- Durée: 2 h et 10 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you curious about the world of hacking? Do you know how hackers break down passwords and break into systems? Would you like to protect your computer systems - and your personal information? With Justin Hatmaker's Hacking: Penetration Testing, Basic Security, and How to Hack, you can do all this and more! What types of hacking attacks are out there? How can you defend yourself?
-
Hacking
- Penetration Testing, Basic Security, and How To Hack
- Narrateur(s): Richard D. Hurd
- Durée: 2 h et 10 min
- Date de publication: 2017-02-27
- Langue: Anglais
- In Hacking: Penetration Testing, Basic Security, and How to Hack, Justin teaches you how to become a basic level hacker. Without complicated jargon and high-level coding....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
The SOPA & PIPA Conspiracy
- Taking CONTROL through Internet Censorship
- Auteur(s): Jeremy Miles
- Narrateur(s): Luke Smith
- Durée: 1 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Have you ever wondered what it would be like if the United States became a clone of China or Burma? That's what almost happened with the SOPA and PIPA bills which attempted to pass into law.
The SOPA & PIPA Conspiracy explains these horrible censorship laws, and what they would have meant, and WILL mean if they ever pass. Learn how you can prevent the destruction of the internet, and ward off any future bills which allow total Government control or censorship.
-
The SOPA & PIPA Conspiracy
- Taking CONTROL through Internet Censorship
- Narrateur(s): Luke Smith
- Durée: 1 h et 13 min
- Date de publication: 2014-04-08
- Langue: Anglais
- Have you ever wondered what it would be like if the United States became a clone of China or Burma?...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Blockchain: Two Books
- The Complete Edition on the Blockchain Basics, Technology and Its Application in Cryptocurrency and Other Industries That Are Happening Now
- Auteur(s): Lee Sebastian
- Narrateur(s): John Flemming
- Durée: 3 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Need to learn blockchain quickly? This crash course will get you up to speed on the basics quickly. This two-in-one audiobook bundle covers all important aspects of blockchain and its applications, especially in cryptocurrency.
-
Blockchain: Two Books
- The Complete Edition on the Blockchain Basics, Technology and Its Application in Cryptocurrency and Other Industries That Are Happening Now
- Narrateur(s): John Flemming
- Durée: 3 h et 8 min
- Date de publication: 2018-11-05
- Langue: Anglais
-
Need to learn blockchain quickly? This crash course will get you up to speed on the basics quickly. This two-in-one audiobook bundle covers all important aspects of blockchain and its applications, especially in cryptocurrency....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Introduction to Cyber Security: Fundamentals
- Auteur(s): Ugo Ekpo MBCS CITP
- Narrateur(s): Bruce Enrietto
- Durée: 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Introduction to Cyber Security is a book for all ages, irrespective of gender, but without the common technical jargon. The objective of this book is to provide the essentials regarding what cyber security is really about and not the perception of it being related purely to hacking activity.
-
Introduction to Cyber Security: Fundamentals
- Narrateur(s): Bruce Enrietto
- Durée: 50 min
- Date de publication: 2019-02-11
- Langue: Anglais
-
Introduction to Cyber Security is a book for all ages, irrespective of gender, but without the common technical jargon....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
Blockchain: Aplicações no Mundo Real e Compreensão
- Como a Blockchain Pode Ser Aplicada em Seu Mundo [How Blockchain Can Be Applied in Your World]
- Auteur(s): Wayne Walker
- Narrateur(s): Ranieri Dos Santos
- Durée: 57 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Você já ouviu o termo blockchain, mas o que é isso realmente? Com base em parte do conteúdo de seu curso Executive Blockchain você pode aprender o que é ensinado a executivos, consultores, líderes, advogados, especialistas em marketing, educadores, etc. em todo o mundo para entender e aplicar os conceitos de Blockchain para uso no mundo real. Este é o livro mais atualizado do mercado sobre blockchain para executivos.
-
Blockchain: Aplicações no Mundo Real e Compreensão
- Como a Blockchain Pode Ser Aplicada em Seu Mundo [How Blockchain Can Be Applied in Your World]
- Narrateur(s): Ranieri Dos Santos
- Durée: 57 min
- Date de publication: 2021-06-09
- Langue: Portugais
-
Você já ouviu o termo blockchain, mas o que é isso realmente? Com base em parte do conteúdo de seu curso Executive Blockchain você pode aprender o que é ensinado a executivos, consultores, líderes, advogados, especialistas em marketing, educadores, etc....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,33$ ou 1 crédit
Prix réduit: 4,33$ ou 1 crédit
-
-
-
Hacking
- A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing
- Auteur(s): John Slavio
- Narrateur(s): T. W. Ashworth
- Durée: 1 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
All you wanted to know about hacking and computer security. This book will teach you everything you need to know about hacking, the history of hacking, the types of hacking, and security measures that you should undertake. This book will teach you about the techniques you can use to prank your friends or spy on your significant other (maybe). It can also get you started on your journey towards being an ethical hacker, which is a fast-growing, in-demand field.
-
Hacking
- A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing
- Narrateur(s): T. W. Ashworth
- Durée: 1 h et 19 min
- Date de publication: 2017-05-11
- Langue: Anglais
- All you wanted to know about hacking and computer security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
Hacking
- Basic Computer Security and Penetration Testing
- Auteur(s): John Slavio
- Narrateur(s): Steve Biddle
- Durée: 1 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Have you wondered what hacking is all about? How do people hack and what are some basic precautions you can take to prevent being hacked? It seems like everyone is being hacked. Celebrities, politicians, large organizations, banks, schools, universities etc. Well, how does this happen? What are the different kinds of attacks? Is there any way you can improve your safety? This book answers all.
-
Hacking
- Basic Computer Security and Penetration Testing
- Narrateur(s): Steve Biddle
- Durée: 1 h et 4 min
- Date de publication: 2016-12-29
- Langue: Anglais
- Do you have a desktop computer, a laptop or even a smartphone? Then you probably have heard the term computer security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Chinese State-Sponsored Cyber Operations
- Observed TTPs
- Auteur(s): The National Security Agency CISA and FBI
- Narrateur(s): Tom Brooks
- Durée: 2 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI) assess that People’s Republic of China's state-sponsored malicious cyberactivity is a major threat to the US and allied cyberspace assets.
-
Chinese State-Sponsored Cyber Operations
- Observed TTPs
- Narrateur(s): Tom Brooks
- Durée: 2 h et 16 min
- Date de publication: 2021-07-29
- Langue: Anglais
-
The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI) assess that People’s Republic of China's state-sponsored malicious cyberactivity is a major threat to the US and allied cyberspace assets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Developer and Vendor Challenges Identity and Access Management
- Auteur(s): National Security Agency (NSA), Infrastructure Security Agency (CISA)
- Narrateur(s): Tom Brooks
- Durée: 2 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Since the introduction of multi-user computer systems, user authentication has primarily relied on the use of usernames and passwords. To strengthen the authentication process, Multi-Factor Authentication (MFA) requires the user to present multiple elements in different categories, or “factors,” as part of an authentication attempt. These factors are something you have, something you know, and something you are.
-
Developer and Vendor Challenges Identity and Access Management
- Narrateur(s): Tom Brooks
- Durée: 2 h et 20 min
- Date de publication: 2023-10-16
- Langue: Anglais
-
Since the introduction of multi-user computer systems, user authentication has primarily relied on the use of usernames and passwords....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
CISA Strategic Plan 2023-2025
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
I am proud to share the 2023–2025 CISA Strategic Plan, the first comprehensive Strategic Plan since CISA was established as an agency in 2018. The strategic plan represents a forward-leaning, unified approach to achieving our vision of ensuring secure and resilient critical infrastructure for the American people.
-
CISA Strategic Plan 2023-2025
- Narrateur(s): Tom Brooks
- Durée: 2 h et 42 min
- Date de publication: 2023-09-25
- Langue: Anglais
-
I am proud to share the 2023–2025 CISA Strategic Plan, the first comprehensive Strategic Plan since CISA was established as an agency in 2018....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The NSA Tips
- Hunting Russian Intelligence "Snake" Malware: May 2023
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive targets. To conduct operations using this tool, the FSB created a covert peer-to-peer (P2P) network of numerous Snake-infected computers worldwide.
-
The NSA Tips
- Hunting Russian Intelligence "Snake" Malware: May 2023
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Date de publication: 2023-05-30
- Langue: Anglais
-
The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cybersecurity Best Practices for Smart Cities
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
These cybersecurity authorities—herein referred to as “authoring organizations”—are aware that communities may seek cost-savings and quality-of-life improvements through the digital transformation of infrastructure to create “smart cities".
-
Cybersecurity Best Practices for Smart Cities
- Narrateur(s): Tom Brooks
- Durée: 2 h et 2 min
- Date de publication: 2023-05-01
- Langue: Anglais
-
These cybersecurity authorities—herein referred to as “authoring organizations”—are aware that communities may seek cost-savings and quality-of-life improvements through the digital transformation of infrastructure to create “smart cities"....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Scam Busters
- How to Avoid the Most Popular Scams of Today!
- Auteur(s): Jim Stephens
- Narrateur(s): Ronald Hucks
- Durée: 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
There are some popular scams anybody ought to avoid when trying to work from home. There are individuals who are constantly attempting to beat any system by doing things lawlessly. Never before has this been more true than with the net unemployment rate so low. Nowadays, millions of Americans battle with unemployment. As long as there's a high level of unemployment, there will be elevated levels of predators looking to target individuals at their most vulnerable moment.
-
Scam Busters
- How to Avoid the Most Popular Scams of Today!
- Narrateur(s): Ronald Hucks
- Durée: 38 min
- Date de publication: 2020-04-16
- Langue: Anglais
-
There are some popular scams anybody ought to avoid when trying to work from home. There are individuals who are constantly attempting to beat any system by doing things lawlessly. Never before has this been more true than with the net unemployment rate so low....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
Your Social Media Happy Guide
- Strategies for Surviving Cyber Bullying
- Auteur(s): Lauren C. Lindsey
- Narrateur(s): Amy Barron Smolinski
- Durée: 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In today’s modern world, it’s almost impossible not to engage with social media and the internet on some level. Unfortunately, despite its many positives, this constant rate of interaction also means that many of us are at an extremely high risk of personal exposure to the dangerous negative effects of trolling and cyberbullying. Now, with the help of Your Social Media Happy Guide, you can learn the strategies to protect and prevent yourself from becoming a target of these harmful internet practices.
-
Your Social Media Happy Guide
- Strategies for Surviving Cyber Bullying
- Narrateur(s): Amy Barron Smolinski
- Durée: 31 min
- Date de publication: 2019-12-11
- Langue: Anglais
-
In today’s modern world, it’s almost impossible not to engage with social media and the internet on some level. Unfortunately, despite its many positives, this constant rate of interaction increases the risk of exposure to the dangerous negative effects of trolling and cyberbullying....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
A Concise Introduction to GDPR
- Narrateur(s): Tom Howery
- Durée: 26 min
- Date de publication: 2018-12-19
- Langue: Anglais
-
A concise introductory guide to the EU General Data Protection Regulation (GDPR)....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
Online Hacker Survival Guide
- Achieving Online Invisibility for Asset and Reputation Protection
- Auteur(s): Naven Johnson
- Narrateur(s): Jane Ellen
- Durée: 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The 21st century is not only an era of technical and computer innovations, but the time when each of us can face a hacker's attack. However, there’s no need to panic! There are some simple tips and recommendations on how to save your digital space from perpetrators and where to go if something strange happens.
-
Online Hacker Survival Guide
- Achieving Online Invisibility for Asset and Reputation Protection
- Narrateur(s): Jane Ellen
- Durée: 41 min
- Date de publication: 2018-10-29
- Langue: Anglais
-
The 21st century is not only an era of technical and computer innovations, but the time when each of us can face a hacker's attack. Here are some simple tips and recommendations on how to save your digital space from perpetrators and where to go if something strange happens....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-