Internet Security
-
-
The Language of Deception
- Weaponizing Next Generation AI
- Auteur(s): Justin Hutchens
- Narrateur(s): Mike Chamberlain
- Durée: 10 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes. In the book, you will explore the history of social engineering and social robotics, the psychology of deception, considerations of machine sentience and consciousness, and the history of how technology has been weaponized in the past.
-
The Language of Deception
- Weaponizing Next Generation AI
- Narrateur(s): Mike Chamberlain
- Durée: 10 h et 38 min
- Date de publication: 2024-02-20
- Langue: Anglais
-
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Auteur(s): George Finney, John Kindervag - foreword
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Date de publication: 2022-10-04
- Langue: Anglais
-
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Coding Democracy
- How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
- Auteur(s): Maureen Webb, Cory Doctorow - foreword
- Narrateur(s): Wendy Tremont King
- Durée: 16 h et 35 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In Coding Democracy, Maureen Webb offers another view. Hackers, she argues, can be vital disruptors. Hacking is becoming a practice, an ethos, and a metaphor for a new wave of activism in which ordinary citizens are inventing new forms of distributed, decentralized democracy for a digital era. Confronted with concentrations of power, mass surveillance, and authoritarianism enabled by new technology, the hacking movement is trying to "build out" democracy into cyberspace.
-
Coding Democracy
- How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
- Narrateur(s): Wendy Tremont King
- Durée: 16 h et 35 min
- Date de publication: 2021-03-09
- Langue: Anglais
-
Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Introduction to Cyber Security: Fundamentals
- Auteur(s): Ugo Ekpo MBCS CITP
- Narrateur(s): Bruce Enrietto
- Durée: 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Introduction to Cyber Security is a book for all ages, irrespective of gender, but without the common technical jargon. The objective of this book is to provide the essentials regarding what cyber security is really about and not the perception of it being related purely to hacking activity.
-
Introduction to Cyber Security: Fundamentals
- Narrateur(s): Bruce Enrietto
- Durée: 50 min
- Date de publication: 2019-02-11
- Langue: Anglais
-
Introduction to Cyber Security is a book for all ages, irrespective of gender, but without the common technical jargon....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- Auteur(s): Jamie Murphy
- Narrateur(s): Tom Brooks
- Durée: 5 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments. From concepts to advanced techniques, this book offers a structured and accessible approach to understanding the nuances of cloud security.
-
CCSP Certified Cloud Security Professional
- A Step by Step Study Guide to Ace the Exam
- Narrateur(s): Tom Brooks
- Durée: 5 h et 19 min
- Date de publication: 2024-04-16
- Langue: Anglais
-
This comprehensive guide serves as a beacon for individuals seeking to attain expertise in the domain of cloud security, equipping them with the knowledge and skills necessary to navigate the complexities of safeguarding cloud environments.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Cybersecurity Essentials
- Auteur(s): Charles J. Brooks, Christopher Grow, Philip Craig, Autres
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Awful as an e-book
- Écrit par Mac le 2021-07-25
-
Cybersecurity Essentials
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Date de publication: 2018-10-30
- Langue: Anglais
-
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53$ ou 1 crédit
Prix réduit: 37,53$ ou 1 crédit
-
-
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Auteur(s): Raymond Phillips
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself. I am sure if you are considering this book, you too have a reason, but going through this process, I have learned a few valuable lessons. This book is all about those lessons, so you don't have to learn on the go as I had to. Instead, you can use this book as a guide and just follow the step by step process and see yourself disappear from the big World Wide Web.
-
How to Disappear from the Internet Completely While Leaving False Trails
- How to Be Anonymous Online
- Narrateur(s): Randal Schaffer
- Durée: 53 min
- Date de publication: 2016-12-14
- Langue: Anglais
- Why do some people want to erase themselves completely from the Internet? I used to wonder about the same till I found the reason and had to do it myself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 5,31$ ou 1 crédit
Prix réduit: 5,31$ ou 1 crédit
-
-
-
Zero Trust Architecture
- Networking Technology: Security
- Auteur(s): Cindy Green-Ortiz, Brandon Fowler, David Houck, Autres
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Zero Trust Architecture
- Networking Technology: Security
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Date de publication: 2024-04-11
- Langue: Anglais
-
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,27$ ou 1 crédit
Prix réduit: 31,27$ ou 1 crédit
-
-
-
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Auteur(s): Zeynep Tufekci
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
An incisive observer, writer, and participant in today's social movements, Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests, and why they have difficulty persisting in their long-term quests for change.
-
-
A must read for those interested in social media
- Écrit par Bijan le 2018-09-13
-
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Date de publication: 2017-05-16
- Langue: Anglais
- Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Auteur(s): Prabath Siriwardena, Nuwan Dias
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication.
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Date de publication: 2021-03-17
- Langue: Anglais
-
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53$ ou 1 crédit
Prix réduit: 37,53$ ou 1 crédit
-
-
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- Narrateur(s): George Mount
- Durée: 3 h et 46 min
- Date de publication: 2021-01-14
- Langue: Anglais
-
The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- Auteur(s): Keith Martin
- Narrateur(s): Matthew Waterson
- Durée: 7 h et 45 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies - in short, everything we do online.
-
Cryptography
- The Key to Digital Security, How It Works, and Why It Matters
- Narrateur(s): Matthew Waterson
- Durée: 7 h et 45 min
- Date de publication: 2020-05-19
- Langue: Anglais
-
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- Auteur(s): David James Carmack
- Narrateur(s): Ivan Busenius
- Durée: 3 h et 58 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- Narrateur(s): Ivan Busenius
- Durée: 3 h et 58 min
- Date de publication: 2020-03-09
- Langue: Anglais
-
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Auteur(s): Clint Watts
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns that have become the cutting edge of modern warfare - and how we can protect ourselves against them. Clint Watts electrified the nation when he testified regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind.
-
-
Interesting and engaging
- Écrit par Mark Dynna le 2018-07-18
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Date de publication: 2018-05-29
- Langue: Anglais
-
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare - and how we can protect ourselves and our country against them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,46$ ou 1 crédit
Prix réduit: 31,46$ ou 1 crédit
-
-
-
Reset
- Reclaiming the Internet for Civil Society
- Auteur(s): Ronald J. Deibert
- Narrateur(s): Ronald J. Deibert
- Durée: 11 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Drawing from the cutting-edge research of the Citizen Lab, the world-renowned digital security research group that he founded and directs, Ronald J. Deibert exposes the impacts of the communications ecosystem on civil society. He tracks a mostly unregulated surveillance industry, innovations in technologies of remote control, superpower policing practices, dark PR firms and highly profitable hack-for-hire services feeding off rivers of poorly secured personal data.
-
Reset
- Reclaiming the Internet for Civil Society
- Narrateur(s): Ronald J. Deibert
- Durée: 11 h et 19 min
- Date de publication: 2021-10-19
- Langue: Anglais
-
Ronald J. Deibert exposes the disturbing influence and impact of the internet on politics, the economy, the environment and humanity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 34,82$ ou 1 crédit
Prix réduit: 34,82$ ou 1 crédit
-
-
-
iRules
- What Every Tech-Healthy Family Needs to Know About Selfies, Sexting, Gaming, and Growing Up
- Auteur(s): Janell Burley Hofmann
- Narrateur(s): Carrington MacDuffie
- Durée: 7 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As Janell Burley Hofmann, mother of five, wrapped her 13-year-old's iPhone on Christmas Eve, she was overwhelmed by questions: "Will my children learn to sit and wonder without Googling? Should I know their passwords for online accounts? Will they experience the value of personal connection without technology?" In iRules, Hofmann provides families with the tools they need to find a balance between technology and human interaction through a philosophy she calls Slow Tech Parenting.
-
iRules
- What Every Tech-Healthy Family Needs to Know About Selfies, Sexting, Gaming, and Growing Up
- Narrateur(s): Carrington MacDuffie
- Durée: 7 h et 15 min
- Date de publication: 2014-05-21
- Langue: Anglais
- In iRules, Hofmann provides families with the tools they need to find a balance between technology and human interaction....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,04$ ou 1 crédit
Prix réduit: 37,04$ ou 1 crédit
-
-
-
Cypherpunks
- Freedom and the Future of the Internet
- Auteur(s): Julian Assange
- Narrateur(s): Tom Pile
- Durée: 4 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s. Now, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us.
-
-
A Prerequisite for Living a Dignified Life in the Modern World
- Écrit par Dustin le 2024-05-28
-
Cypherpunks
- Freedom and the Future of the Internet
- Narrateur(s): Tom Pile
- Durée: 4 h et 13 min
- Date de publication: 2013-06-10
- Langue: Anglais
- Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,50$ ou 1 crédit
Prix réduit: 22,50$ ou 1 crédit
-
-
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Auteur(s): Perry Carpenter, Kai Roer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
Really good book, but lots of diagrams
- Écrit par Vince le 2022-12-16
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- Narrateur(s): Perry Carpenter
- Durée: 6 h et 55 min
- Date de publication: 2022-07-26
- Langue: Anglais
-
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven insights into how to transform your organization's security culture and reduce human risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
The NIST Framework (CSF) 2.0
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 2 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization - regardless of its size, sector, or maturity - to better understand, assess, prioritize, and communicate its cybersecurity efforts.
-
-
just reading an online free PFF
- Écrit par Haidy Giratallah le 2024-05-28
-
The NIST Framework (CSF) 2.0
- Narrateur(s): Tom Brooks
- Durée: 2 h et 33 min
- Date de publication: 2024-04-02
- Langue: Anglais
-
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity for Beginners: 3 Books in 1
- What You Must Know About Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
- Auteur(s): Attila Kovacs
- Narrateur(s): Matyas J
- Durée: 5 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this audiobook you will learn: What types of roles exist in the field of Cybersecurity, what key concepts and methodologies you must learn in Cybersecurity, what are the key technologies that you should be aware, how to get started in the field of Cybersecurity, what kind of Cybersecurity entry level salary you can expect, how to overcome obstructions and get things done, how to become a project oriented security professional, what kind of mindset you must have in Cybersecurity, how to express your unique voice in Cybersecurity, and much more!
-
Cybersecurity for Beginners: 3 Books in 1
- What You Must Know About Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
- Narrateur(s): Matyas J
- Série: Cybersecurity for Beginners
- Durée: 5 h et 47 min
- Date de publication: 2020-04-10
- Langue: Anglais
-
In this audiobook you will learn: What types of roles exist in the field of Cybersecurity, what key concepts and methodologies you must learn in Cybersecurity, what are the key technologies that you should be aware, how to get started in the field of Cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-