Internet Security
-
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Auteur(s): Perry Carpenter, Kai Roer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
Really good book, but lots of diagrams
- Écrit par Vince le 2022-12-16
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven insights into how to transform your organization's security culture and reduce human risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Auteur(s): Prabath Siriwardena, Nuwan Dias
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication.
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Date de publication: 2021-03-17
- Langue: Anglais
-
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53$ ou 1 crédit
Prix réduit: 37,53$ ou 1 crédit
-
-
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 11 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application. Equip yourself with a dual weapon against cyber threats – a theoretical understanding and actionable strategies. Whether you're a cybersecurity novice or a seasoned expert, this 2-in-1 bundle is a must-have resource.
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- Narrateur(s): Kim Pepper
- Durée: 11 h et 43 min
- Date de publication: 2023-12-03
- Langue: Anglais
-
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Auteur(s): Alan T. Norman
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity. The audiobook concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks. Gain the ability to do ethical hacking and penetration testing by taking this hacking audiobook!
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Date de publication: 2019-10-03
- Langue: Anglais
-
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cybersecurity Jobs 3-in-1 Value Bundle
- Resume Marketing, Career Paths and Work From Home with Cybersecurity
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 5 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
According to the White House, there are 700,000 cybersecurity positions open today. Using the techniques in this series, you can be a part of one of the fastest, highest-salary career paths in IT.
-
Cybersecurity Jobs 3-in-1 Value Bundle
- Resume Marketing, Career Paths and Work From Home with Cybersecurity
- Narrateur(s): Frank Block
- Durée: 5 h et 32 min
- Date de publication: 2023-12-03
- Langue: Anglais
-
According to the White House, there are 700,000 cybersecurity positions open today....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Crash Override
- How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate
- Auteur(s): Zoë Quinn
- Narrateur(s): Zoë Quinn
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
You've heard the stories about the dark side of the internet—hackers, #gamergate, anonymous mobs attacking an unlucky victim, and revenge porn—but they remain just that: Stories. Surely these things would never happen to you. Zoe Quinn used to feel the same way. She is a video game developer whose ex-boyfriend published a crazed blog post cobbled together from private information, half-truths, and outright fictions, along with a rallying cry to the online hordes to go after her. They answered in the form of a so-called movement known as #gamergate.
-
Crash Override
- How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate
- Narrateur(s): Zoë Quinn
- Durée: 7 h et 9 min
- Date de publication: 2017-09-05
- Langue: Anglais
-
You've heard the stories about the dark side of the internet—hackers, #gamergate, anonymous mobs attacking an unlucky victim, and revenge porn—but they remain just that: Stories. Surely these things would never happen to you. Zoe Quinn used to feel the same way....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 38,31$ ou 1 crédit
Prix réduit: 38,31$ ou 1 crédit
-
-
-
NSA Secrets
- Government Spying in the Internet Age
- Auteur(s): The Washington Post
- Narrateur(s): James Adams
- Durée: 6 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The NSA's extensive surveillance program has riveted America as the public questions the threats to their privacy. As reported by The Washington Post, in their Pulitzer Prize-winning coverage of whistleblower Edward Snowden's NSA leaks, NSA Secrets delves into the shadowy world of information gathering, exposing how data about you is being gathered every day. From his earliest encrypted exchanges with reporters, Edward Snowden knew he was a man in danger.
-
NSA Secrets
- Government Spying in the Internet Age
- Narrateur(s): James Adams
- Durée: 6 h et 20 min
- Date de publication: 2015-01-13
- Langue: Anglais
- NSA Secrets delves into the shadowy world of information gathering, exposing how data about you is being gathered every day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,40$ ou 1 crédit
Prix réduit: 26,40$ ou 1 crédit
-
-
-
The Code of Honor
- Embracing Ethics in Cybersecurity
- Auteur(s): Paul J. Maurer, Ed Skoudis
- Narrateur(s): Rick Adamson
- Durée: 5 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, president of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, president of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world.
-
The Code of Honor
- Embracing Ethics in Cybersecurity
- Narrateur(s): Rick Adamson
- Durée: 5 h et 42 min
- Date de publication: 2024-08-13
- Langue: Anglais
-
While some professions-including medicine, law, and engineering-have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92$ ou 1 crédit
Prix réduit: 21,92$ ou 1 crédit
-
-
-
CISA Cybersecurity Strategic Plan FY2024-2026
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Malicious cyber actors recognize our dependence on technology and constantly attempt to exploit this reliance for financial or strategic gain. Too often, they succeed. Their success is enabled by an environment of insecurity, in which our enterprises are too difficult to defend, and our technology products are too vulnerable to protect.
-
CISA Cybersecurity Strategic Plan FY2024-2026
- Narrateur(s): Tom Brooks
- Durée: 2 h et 37 min
- Date de publication: 2023-09-28
- Langue: Anglais
-
Malicious cyber actors recognize our dependence on technology and constantly attempt to exploit this reliance for financial or strategic gain. Too often, they succeed....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Zero Trust and Third-Party Risk
- Reduce the Blast Radius
- Auteur(s): Gregory C. Rasner
- Narrateur(s): Mike Lenz
- Durée: 6 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk.
-
Zero Trust and Third-Party Risk
- Reduce the Blast Radius
- Narrateur(s): Mike Lenz
- Durée: 6 h et 49 min
- Date de publication: 2023-11-14
- Langue: Anglais
-
Dramatically lower the cyber risk posed by third-party software and vendors in your organization....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,81$ ou 1 crédit
Prix réduit: 17,81$ ou 1 crédit
-
-
-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- Auteur(s): Keith Martin
- Narrateur(s): Matthew Waterson
- Durée: 7 h et 45 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies - in short, everything we do online.
-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- Narrateur(s): Matthew Waterson
- Durée: 7 h et 45 min
- Date de publication: 2020-05-19
- Langue: Anglais
-
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Digital Identity and Privacy
- Beginner’s Guide to the Technology that Governs Our Lives
- Auteur(s): Vadim Slavin
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h et 56 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In today's digital age, digital identity is an integral part of our lives. From online banking to social media, we use digital identities to access services, interact with others, and manage our daily lives. Because of this, we are becoming increasingly vulnerable to exploits targeting our online identity.
-
-
short & sweet
- Écrit par nil le 2023-05-29
-
Digital Identity and Privacy
- Beginner’s Guide to the Technology that Governs Our Lives
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h et 56 min
- Date de publication: 2023-04-24
- Langue: Anglais
-
In today's digital age, digital identity is an integral part of our lives. From online banking to social media, we use digital identities to access services, interact with others, and manage our daily lives....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Coding Democracy
- How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
- Auteur(s): Maureen Webb, Cory Doctorow - foreword
- Narrateur(s): Wendy Tremont King
- Durée: 16 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In Coding Democracy, Maureen Webb offers another view. Hackers, she argues, can be vital disruptors. Hacking is becoming a practice, an ethos, and a metaphor for a new wave of activism in which ordinary citizens are inventing new forms of distributed, decentralized democracy for a digital era. Confronted with concentrations of power, mass surveillance, and authoritarianism enabled by new technology, the hacking movement is trying to "build out" democracy into cyberspace.
-
Coding Democracy
- How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
- Narrateur(s): Wendy Tremont King
- Durée: 16 h et 35 min
- Date de publication: 2021-03-09
- Langue: Anglais
-
Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Viral Parenting
- A Guide to Setting Boundaries, Building Trust, and Raising Responsible Kids in an Online World
- Auteur(s): Mindy McKnight
- Narrateur(s): Mindy McKnight, Shaun McKnight, Brooklyn McKnight, Autres
- Durée: 7 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Viral Parenting is a guide to raising responsible, safe, and communicative kids in the digital world. Mindy shares practical tools for having honest conversations with kids of all ages about privacy, bullying, respectfulness, and family time while emphasizing the importance of trust and open communication. These strategies are timeless - whether applied to texting, snapping, Facebooking, kiking, or whatever social media platforms await us in the future, this book is ultimately about teaching children about personal responsibility and safety.
-
Viral Parenting
- A Guide to Setting Boundaries, Building Trust, and Raising Responsible Kids in an Online World
- Narrateur(s): Mindy McKnight, Shaun McKnight, Brooklyn McKnight, Bailey McKnight
- Durée: 7 h et 28 min
- Date de publication: 2019-04-30
- Langue: Anglais
-
Viral Parenting is a guide to raising responsible, safe, and communicative kids in the digital world. Mindy shares practical tools for having honest conversations with kids of all ages about privacy, bullying, respectfulness, and family time....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,23$ ou 1 crédit
Prix réduit: 25,23$ ou 1 crédit
-
-
-
Dot Con
- The Art of Scamming a Scammer
- Auteur(s): James Veitch
- Narrateur(s): James Veitch, Naomi Petersen
- Durée: 2 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Nigerian prince eager to fork over his inheritance, the family friend stranded unexpectedly in Norway, the lonely Russian beauty looking for love...they spam our inboxes with their hapless pleas for help, money, and your social security number. In Dot Con, Veitch finally answers the question: What would happen if you replied?
-
-
Hilarious
- Écrit par Amazon Customer le 2022-08-19
-
Dot Con
- The Art of Scamming a Scammer
- Narrateur(s): James Veitch, Naomi Petersen
- Durée: 2 h et 28 min
- Date de publication: 2020-06-02
- Langue: Anglais
-
The Nigerian prince eager to fork over his inheritance, the family friend stranded unexpectedly in Norway, the lonely Russian beauty looking for love...they spam our inboxes with their hapless pleas for help, money, and your social security number....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 15,14$ ou 1 crédit
Prix réduit: 15,14$ ou 1 crédit
-
-
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Auteur(s): Jon R. Lindsay - editor, Tai Ming Cheung - editor, Derek S. Reveron - editor
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks—predominantly from the United States. China and Cybersecurity is a comprehensive analysis of China's cyberspace threats and policies.
-
China and Cybersecurity
- Espionage, Strategy, and Politics in the Digital Domain
- Narrateur(s): Rebecca Lam
- Durée: 13 h et 16 min
- Date de publication: 2024-05-21
- Langue: Anglais
-
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,30$ ou 1 crédit
Prix réduit: 26,30$ ou 1 crédit
-
-
-
Safe
- How to Stay Safe in a Dangerous World
- Auteur(s): Chris Ryan
- Narrateur(s): Michael Fenner
- Durée: 7 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
How to keep you and yours safe from the perils of the modern world. In today's increasingly hostile climate, people are anxious about how to keep themselves safe. Chris Ryan is an expert in dangerous situations, and here he tells you how to keep yourself and your family safe from the perils of modern urban life.
-
Safe
- How to Stay Safe in a Dangerous World
- Narrateur(s): Michael Fenner
- Durée: 7 h et 2 min
- Date de publication: 2017-10-19
- Langue: Anglais
- How to keep you and yours safe from the perils of the modern world....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,83$ ou 1 crédit
Prix réduit: 37,83$ ou 1 crédit
-
-
-
CC Certified in Cybersecurity
- The Complete ISC2 Certification Study Guide
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification. Navigating through fundamental concepts and advanced techniques, this book serves as a trusted companion for those seeking to master the intricate landscape of cybersecurity.
-
CC Certified in Cybersecurity
- The Complete ISC2 Certification Study Guide
- Narrateur(s): Tom Brooks
- Durée: 5 h et 2 min
- Date de publication: 2024-04-09
- Langue: Anglais
-
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
We Have Root
- Even More Advice from Schneier on Security
- Auteur(s): Bruce Schneier
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments.
-
We Have Root
- Even More Advice from Schneier on Security
- Narrateur(s): Graham Rowat
- Durée: 10 h et 53 min
- Date de publication: 2019-11-08
- Langue: Anglais
-
In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Threats
- What Every Engineer Should Learn from Star Wars
- Auteur(s): Adam Shostack
- Narrateur(s): Joe Hempel
- Durée: 10 h et 7 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a structured and memorable way—about the threats to your systems. You'll move from thinking of security issues as clever one-offs and learn to see the patterns they follow.
-
Threats
- What Every Engineer Should Learn from Star Wars
- Narrateur(s): Joe Hempel
- Durée: 10 h et 7 min
- Date de publication: 2023-03-21
- Langue: Anglais
-
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-