Internet Security
-
-
Ransom War
- How Cyber Crime Became a Threat to National Security
- Auteur(s): Max Smeets
- Narrateur(s): Walter Dixon
- Durée: 6 h et 24 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This timely book explores the alarming rise of ransomware: malicious software blocking users from their systems or data until they've paid money to regain access or to prevent the release of sensitive information. High-profile British examples of the twenty-first century have targeted national libraries and healthcare organizations; in the US, hackers of Pennsylvania's Lehigh Valley Health Network held patient data hostage—when their demands went unmet, they published topless photographs of women with breast cancer.
-
Ransom War
- How Cyber Crime Became a Threat to National Security
- Narrateur(s): Walter Dixon
- Durée: 6 h et 24 min
- Date de publication: 2025-05-27
- Langue: Anglais
-
This timely book explores the alarming rise of ransomware: malicious software blocking users from their systems or data until they've paid money to regain access or to prevent the release of sensitive information.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $
-
-
-
CyberSecurity Metaverse
- Auteur(s): Sajed Khan
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds. There is a lot of marketing hype wrapped up in this idea of the metaverse, from Crypto, NFT, and Blockchain to digital wardrobes. To help you get a sense of how vague and complex a term the "metaverse" can be, this audiobook is written around the parameters of what the metaverse means but more importantly cybersecurity.
-
CyberSecurity Metaverse
- Narrateur(s): Gary Middleton
- Durée: 2 h et 9 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Speaking about the "metaverse" is like having a discussion about what "the internet" was in the 1990s. Today, there is a new form of communication and we're in the process of building a new reality but don't really know what the future holds....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
Digital Privacy: Internet Security to Stop Big Companies from Tracking and Selling Your Data
- Auteur(s): Eric Faster, Chris Capra
- Narrateur(s): Skyler Morgan
- Durée: 3 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Your data has already been sold...Get it back. There are so many times when we are online, and we need to make sure that our data is safe. We assume that we are doing a good job with a bit of anti-virus protection and carefully selecting what sites we visit. But when some of the big companies we trust, including Facebook, Google, and more, are willing to gather up as much data as they can about all our lives (whether online or not) and then sell it make money, it’s hard to know how safe our information really is.
-
Digital Privacy: Internet Security to Stop Big Companies from Tracking and Selling Your Data
- Narrateur(s): Skyler Morgan
- Durée: 3 h et 17 min
- Date de publication: 2020-10-12
- Langue: Anglais
-
Your data has already been sold...Get it back. There are so many times when we are online, and we need to make sure that our data is safe. We assume that we are doing a good job with a bit of anti-virus protection and carefully selecting what sites we visit....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Auteur(s): Jennifer Bleam
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
What value does managed security bring when there’s no way to promise ROI? How do you convince small business owners to part with their hard-earned revenue when they don’t feel vulnerable to a cyberattack? What is the best way to mitigate your clients’ risk without feeling dishonest or using slimy sales tactics? And could someone please demystify sales and make it easy? This book is the answer to all those questions and more. Forged in the steel of real-world MSP successes and failures, you’ll learn how to sell cybersecurity, simply and easily—even for the techiest tech in the industry.
-
Simplified Cybersecurity Sales for MSPs
- The Secret Formula for Closing Cybersecurity Deals Without Feeling Slimy
- Narrateur(s): Jennifer Bleam
- Durée: 2 h et 9 min
- Date de publication: 2023-09-18
- Langue: Anglais
-
Most Managed Service Providers slog their way through sales because they know their services will bring value to their clients. But now that cybersecurity has become a mandatory concern for all businesses, the world of sales is even more uncertain....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
The Art of Cyber Security
- A Practical Guide to Winning the War on Cyber Crime
- Auteur(s): Gary Hibberd
- Narrateur(s): Alan Medcroft
- Durée: 4 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook celebrates the individuals who are striving to protect us in an ever-expanding technological era. Data and technology are so important to our lives that protecting people who use technology is incredibly important. The professionals working to protect children, adults, and corporations have a tough job, and this audiobook celebrates their work while advocating ways for improving cyber security services and fighting cyber crime.
-
The Art of Cyber Security
- A Practical Guide to Winning the War on Cyber Crime
- Narrateur(s): Alan Medcroft
- Durée: 4 h et 42 min
- Date de publication: 2023-06-26
- Langue: Anglais
-
This audiobook will challenge your thinking and force you to approach cyber security and data protection from theoretical, philosophical, strategic, tactical, and operational perspectives....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- Auteur(s): Frank W. Abagnale
- Narrateur(s): Raymond Todd
- Durée: 7 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Someone in the U.S. is an identity-theft victim every four seconds. It is extremely easy for anyone from anywhere in the world to assume your identity and, in a matter of hours, devastate your life in ways that can take years to recover from. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes.
-
Stealing Your Life
- The Ultimate Identity Theft Prevention Plan
- Narrateur(s): Raymond Todd
- Durée: 7 h et 16 min
- Date de publication: 2007-04-09
- Langue: Anglais
- Someone in the U.S. is an identity-theft victim every four seconds. Stealing Your Life is the reference everyone needs, by an unsurpassed authority on the latest identity-theft schemes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,98 $
-
-
-
Crash Override
- How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate
- Auteur(s): Zoë Quinn
- Narrateur(s): Zoë Quinn
- Durée: 7 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
You've heard the stories about the dark side of the internet—hackers, #gamergate, anonymous mobs attacking an unlucky victim, and revenge porn—but they remain just that: Stories. Surely these things would never happen to you. Zoe Quinn used to feel the same way. She is a video game developer whose ex-boyfriend published a crazed blog post cobbled together from private information, half-truths, and outright fictions, along with a rallying cry to the online hordes to go after her. They answered in the form of a so-called movement known as #gamergate.
-
Crash Override
- How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate
- Narrateur(s): Zoë Quinn
- Durée: 7 h et 9 min
- Date de publication: 2017-09-05
- Langue: Anglais
-
You've heard the stories about the dark side of the internet—hackers, #gamergate, anonymous mobs attacking an unlucky victim, and revenge porn—but they remain just that: Stories. Surely these things would never happen to you. Zoe Quinn used to feel the same way....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 38,31 $
-
-
-
Zero Trust and Third-Party Risk
- Reduce the Blast Radius
- Auteur(s): Gregory C. Rasner
- Narrateur(s): Mike Lenz
- Durée: 6 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk.
-
Zero Trust and Third-Party Risk
- Reduce the Blast Radius
- Narrateur(s): Mike Lenz
- Durée: 6 h et 49 min
- Date de publication: 2023-11-14
- Langue: Anglais
-
Dramatically lower the cyber risk posed by third-party software and vendors in your organization....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,81 $
-
-
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Auteur(s): Gabriella Coleman
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Date de publication: 2017-01-31
- Langue: Anglais
- Anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,82 $
-
-
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Auteur(s): Clint Watts
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns that have become the cutting edge of modern warfare - and how we can protect ourselves against them. Clint Watts electrified the nation when he testified regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind.
-
-
Interesting and engaging
- Écrit par Mark Dynna le 2018-07-18
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Date de publication: 2018-05-29
- Langue: Anglais
-
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare - and how we can protect ourselves and our country against them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,46 $
-
-
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Auteur(s): Garrett Sutton Esq., Robert T. Kiyosaki - foreword
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Deceptive misinformation comes at us for many reasons. A key one is to steal our assets. We are free to communicate and stay connected in many ways. This great benefit, however, is now abused by criminal elements to take and defraud, bringing shame on trusting souls. The wreckage wrought by cyber criminality is not only financial but highly emotional. Lives are lost to depression and suicide. Don’t let this happen to you or your family. Scam Proof Your Assets: Guarding Against Widespread Deception gives you the tools and context for protecting yourself.
-
Scam-Proof Your Assets
- Guarding Against Widespread Deception
- Narrateur(s): Garrett Sutton Esq., Steve Stratton
- Durée: 9 h et 35 min
- Date de publication: 2021-05-03
- Langue: Anglais
-
Scam Proof Your Assets gives you the tools and context for protecting yourself. Unlike other sources, Scam Proof Your Assets teaches you the patterns to look for, including greed and fear, "expert" positioning and charm as manipulation....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 28,27 $
-
-
-
The Code of Honor
- Embracing Ethics in Cybersecurity
- Auteur(s): Paul J. Maurer, Ed Skoudis
- Narrateur(s): Rick Adamson
- Durée: 5 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, president of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, president of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world.
-
The Code of Honor
- Embracing Ethics in Cybersecurity
- Narrateur(s): Rick Adamson
- Durée: 5 h et 42 min
- Date de publication: 2024-08-13
- Langue: Anglais
-
While some professions-including medicine, law, and engineering-have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 21,92 $
-
-
-
Cybersecurity Bundle: 4 Books in One
- The World of Cybersecurity - Cybersecurity for Small Business - Is Cyber Deterrence Possible? - Cybersecurity Career Path
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 4 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As the times have shifted in the last decade or so, we have started to depend more and more upon our computers as well as other electronic devices for our needs. The United States’ reliance on networked systems and the high costs associated with cyber attacks have led many leaders in the US government and the Department of Defense (DOD) to prioritize protecting our critical networked infrastructure. Part of that focus is trying to develop a strategy for deterring adversaries from attacking our networks in the first place.
-
Cybersecurity Bundle: 4 Books in One
- The World of Cybersecurity - Cybersecurity for Small Business - Is Cyber Deterrence Possible? - Cybersecurity Career Path
- Narrateur(s): Tom Brooks
- Durée: 4 h et 23 min
- Date de publication: 2021-06-09
- Langue: Anglais
-
As the times have shifted in the last decade or so, we have started to depend more and more upon our computers as well as other electronic devices for our needs. It's only natural for you to worry about your own safety when you know the extent of the dependency upon technology around you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
You CAN Stop Stupid
- Stopping Losses from Accidental and Malicious Actions
- Auteur(s): Ira Winkler, Dr. Tracy Celaya Brown
- Narrateur(s): Chris Sorensen
- Durée: 14 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, Ira Winkler and Dr. Tracy Celaya's You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement.
-
You CAN Stop Stupid
- Stopping Losses from Accidental and Malicious Actions
- Narrateur(s): Chris Sorensen
- Durée: 14 h et 44 min
- Date de publication: 2021-01-26
- Langue: Anglais
-
Ira Winkler and Dr. Tracy Celaya's You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83 $
-
-
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Auteur(s): Shashi Shekhar, Pamela Vold
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Billions of people around the globe use various applications of spatial computing daily - by using a ride-sharing app, GPS, social media check-ins, even Pokemon Go. Scientists and researchers use spatial computing to track diseases, map the bottom of the oceans, chart the behavior of endangered species, and create election maps in real time. Drones and driverless cars use a variety of spatial computing technologies. Spatial computing works by understanding the physical world, knowing and communicating our relation to places in that world, and navigating through those places.
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Date de publication: 2020-06-02
- Langue: Anglais
-
Billions of people around the globe use various applications of spatial computing daily-by using a ride-sharing app, GPS, the e911 system, social media check-ins, even Pokemon Go....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $
-
-
-
Cyber Security - 3 Book Combo
- Cyber Essentials - Cybersecurity for Small Business - Is Cyber Deterrence Possible?
- Auteur(s): Cybersecurity and Infrastructure Security Agency - FTC - US Department of Defense
- Narrateur(s): Tom Brooks
- Durée: 3 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As a leader, you need to drive your organization’s approach to cybersecurity as you would any other hazard (e.g. how you identify risk, reduce vulnerabilities, and plan for contingencies). This requires an investment of time and money, as well as the collective buy-in of your management team. Your investment drives actions and activities, and these build and sustain a culture of cybersecurity.
-
Cyber Security - 3 Book Combo
- Cyber Essentials - Cybersecurity for Small Business - Is Cyber Deterrence Possible?
- Narrateur(s): Tom Brooks
- Durée: 3 h et 16 min
- Date de publication: 2021-07-15
- Langue: Anglais
-
As a leader, you need to drive your organization’s approach to cybersecurity as you would any other hazard (e.g. how you identify risk, reduce vulnerabilities, and plan for contingencies). This requires an investment of time and money and the collective buy-in of your management team....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
Savvy Up
- The Ultimate Upgrade for Outsmarting Scams, Manipulation and Physical Threats
- Auteur(s): Stuart Kirby
- Narrateur(s): Stuart Kirby
- Durée: 5 h et 45 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A day rarely goes by without hearing about someone being scammed, manipulated, or even physically assaulted. Maybe you’ve been a victim yourself—left feeling violated and frustrated. But with the right knowledge and strategies, you don’t have to live in fear. Being Savvy means staying one step ahead—whether it’s spotting when someone is trying to overcharge or deceive you, protecting yourself from identity theft after a stolen phone, or shutting down intimidation before it escalates. You will know how to handle threats before they become problems.
-
Savvy Up
- The Ultimate Upgrade for Outsmarting Scams, Manipulation and Physical Threats
- Narrateur(s): Stuart Kirby
- Durée: 5 h et 45 min
- Date de publication: 2025-03-27
- Langue: Anglais
-
A day rarely goes by without hearing about someone being scammed, manipulated, or even physically assaulted. Maybe you’ve been a victim yourself—left feeling violated and frustrated. But with the right knowledge and strategies, you don’t have to live in fear.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $
-
-
-
Asking the Right Questions
- A Guide to Critical OT Cybersecurity
- Auteur(s): Chukwudi Abalogu
- Narrateur(s): B Fike
- Durée: 4 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The journey towards robust OT cybersecurity is not a destination but a continuous evolution. As technology advances and threat actors become more sophisticated, the need for vigilance and adaptation remains paramount. This book has provided a framework—a set of guiding principles and actionable strategies—for building a resilient cybersecurity posture. However, the true measure of success lies not in the implementation of specific technologies or policies but in the cultivation of a security-conscious culture.
-
Asking the Right Questions
- A Guide to Critical OT Cybersecurity
- Narrateur(s): B Fike
- Durée: 4 h et 4 min
- Date de publication: 2025-03-20
- Langue: Anglais
-
The journey towards robust OT cybersecurity is not a destination but a continuous evolution. As technology advances and threat actors become more sophisticated, the need for vigilance and adaptation remains paramount.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- Auteur(s): Kip Boyle
- Narrateur(s): Kip A. Boyle
- Durée: 5 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- Narrateur(s): Kip A. Boyle
- Durée: 5 h et 14 min
- Date de publication: 2019-09-14
- Langue: Anglais
-
With this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $
-
-
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover everything you need to know about hacking. Step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one download! You need to get it now to know what's inside, as it can't be shared here!
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Date de publication: 2015-12-21
- Langue: Anglais
- Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34 $
-