Internet Security
-
-
Web3 Social
- How Creators Are Changing the World Wide Web (and You Can Too!)
- Auteur(s): Allen Taylor
- Narrateur(s): Allen Taylor
- Durée: 7 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Web3 is emerging to expand the opportunities for creators by delivering tools that help them regain their content freedom, monetize their content better, safeguard their personal data, and fight back against censorship.
-
Web3 Social
- How Creators Are Changing the World Wide Web (and You Can Too!)
- Narrateur(s): Allen Taylor
- Durée: 7 h et 28 min
- Date de publication: 2023-05-18
- Langue: Anglais
-
Web3 is emerging to expand the opportunities for creators by delivering tools that help them regain their content freedom, monetize their content better, safeguard their personal data, and fight back against censorship....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Auteur(s): Shashi Shekhar, Pamela Vold
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Billions of people around the globe use various applications of spatial computing daily - by using a ride-sharing app, GPS, social media check-ins, even Pokemon Go. Scientists and researchers use spatial computing to track diseases, map the bottom of the oceans, chart the behavior of endangered species, and create election maps in real time. Drones and driverless cars use a variety of spatial computing technologies. Spatial computing works by understanding the physical world, knowing and communicating our relation to places in that world, and navigating through those places.
-
Spatial Computing
- MIT Press Essential Knowledge Series
- Narrateur(s): Rosemary Benson
- Durée: 5 h et 30 min
- Date de publication: 2020-06-02
- Langue: Anglais
-
Billions of people around the globe use various applications of spatial computing daily-by using a ride-sharing app, GPS, the e911 system, social media check-ins, even Pokemon Go....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $ ou 1 crédit
Prix réduit: 22,26 $ ou 1 crédit
-
-
-
Well Aware
- Master the Nine Cybersecurity Habits to Protect Your Future
- Auteur(s): George Finney
- Narrateur(s): Brett Barry
- Durée: 6 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Well Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it’s a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered - literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception - drawn from knowledge the author has acquired during two decades of experience in cybersecurity. By implementing these habits and changing our behaviors, we can combat most security problems.
-
Well Aware
- Master the Nine Cybersecurity Habits to Protect Your Future
- Narrateur(s): Brett Barry
- Durée: 6 h et 33 min
- Date de publication: 2020-12-07
- Langue: Anglais
-
Well Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it’s a people problem....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 20,15 $ ou 1 crédit
Prix réduit: 20,15 $ ou 1 crédit
-
-
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Auteur(s): Alan T. Norman
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity. The audiobook concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks. Gain the ability to do ethical hacking and penetration testing by taking this hacking audiobook!
-
Hacked
- Kali Linux and Wireless Hacking Ultimate Guide with Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book
- Narrateur(s): Jack Ares
- Durée: 3 h et 14 min
- Date de publication: 2019-10-03
- Langue: Anglais
-
Hacking audiobook is intended to serve as an intermediate-level guide to some common penetration testing tools and skills - particularly those of wireless hacking and of maintaining anonymity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
No Safe Harbor
- The Inside Truth About Cybercrime - and How to Protect Your Business
- Auteur(s): Mark Sangster
- Narrateur(s): Kevin Stillwell
- Durée: 5 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster tells listeners that cybersecurity is not an IT problem to solve - it is a business risk to manage.
-
No Safe Harbor
- The Inside Truth About Cybercrime - and How to Protect Your Business
- Narrateur(s): Kevin Stillwell
- Durée: 5 h et 27 min
- Date de publication: 2020-12-11
- Langue: Anglais
-
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- Auteur(s): Kip Boyle
- Narrateur(s): Kip A. Boyle
- Durée: 5 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- Narrateur(s): Kip A. Boyle
- Durée: 5 h et 14 min
- Date de publication: 2019-09-14
- Langue: Anglais
-
With this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Fond-Hope, Focus, & Favor
- How I Got into Cybersecurity, and Why You Should Too
- Auteur(s): George McPherson
- Narrateur(s): George McPherson
- Durée: 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Believe you can, and you will! This is a brief story of how a veteran security professional and cyber influencer George McPherson got into cybersecurity.
-
Fond-Hope, Focus, & Favor
- How I Got into Cybersecurity, and Why You Should Too
- Narrateur(s): George McPherson
- Durée: 5 min
- Date de publication: 2020-01-13
- Langue: Anglais
-
Believe you can, and you will! This is a brief story of how a veteran security professional and cyber influencer George McPherson got into cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95 $ ou 1 crédit
Prix réduit: 4,95 $ ou 1 crédit
-
-
-
Cybersecurity Jobs 3-in-1 Value Bundle
- Resume Marketing, Career Paths and Work From Home with Cybersecurity
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 5 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
According to the White House, there are 700,000 cybersecurity positions open today. Using the techniques in this series, you can be a part of one of the fastest, highest-salary career paths in IT.
-
Cybersecurity Jobs 3-in-1 Value Bundle
- Resume Marketing, Career Paths and Work From Home with Cybersecurity
- Narrateur(s): Frank Block
- Durée: 5 h et 32 min
- Date de publication: 2023-12-03
- Langue: Anglais
-
According to the White House, there are 700,000 cybersecurity positions open today....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Hacking: Hacking Firewalls & Bypassing Honeypots
- Auteur(s): Alex Wagner
- Narrateur(s): Jack Bellows
- Durée: 3 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. The main focus of this audiobook is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems, or Honeypots work. Your listening of this audiobook will boost your knowledge on what is possible in today’s hacking world and help you to become an Ethical Hacker aka Penetration Tester.
-
Hacking: Hacking Firewalls & Bypassing Honeypots
- Narrateur(s): Jack Bellows
- Durée: 3 h et 44 min
- Date de publication: 2020-05-22
- Langue: Anglais
-
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 13,52 $ ou 1 crédit
Prix réduit: 13,52 $ ou 1 crédit
-
-
-
The Cyber Security Survival Guide
- GRIPIT: Get Real Identity Theft Protection, Information & Technology
- Auteur(s): J.K. Ripley
- Narrateur(s): Tom Brooks
- Durée: 4 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book eliminates intimidation with clear, jargon-free guidance and practical steps to keep you and your loved ones safe online. It’s never too late to take control of your digital security.
-
The Cyber Security Survival Guide
- GRIPIT: Get Real Identity Theft Protection, Information & Technology
- Narrateur(s): Tom Brooks
- Durée: 4 h et 16 min
- Date de publication: 2025-01-06
- Langue: Anglais
-
This book eliminates intimidation with clear, jargon-free guidance and practical steps to keep you and your loved ones safe online. It’s never too late to take control of your digital security.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-
-
-
The Future of Reputation
- Gossip, Rumor, and Privacy on the Internet
- Auteur(s): Daniel J. Solove
- Narrateur(s): Jeff Wilson
- Durée: 8 h et 24 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This engrossing book explores the profound implications of personal information on the Internet, preserved forever even if it is false, biased, or humiliating. Brimming with examples of online gossip, slander, and rumor, the book discusses the tensions between privacy and free speech and proposes how to balance the two. What information about you is on the Internet?
-
The Future of Reputation
- Gossip, Rumor, and Privacy on the Internet
- Narrateur(s): Jeff Wilson
- Durée: 8 h et 24 min
- Date de publication: 2010-03-10
- Langue: Anglais
- This engrossing book explores the profound implications of personal information on the Internet, preserved forever even if it is false, biased, or humiliating....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,52 $ ou 1 crédit
Prix réduit: 18,52 $ ou 1 crédit
-
-
-
Combatting Cyber Terrorism
- A Guide to Understanding the Cyber Threat Landscape and Incident Response Planning
- Auteur(s): Richard Bingley
- Narrateur(s): Daniel Crespin
- Durée: 6 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook recounts case studies to show the types of threats we face and provides a comprehensive coverage of risk management tactics and strategies to protect yourself against such nefarious threat actors. These include key mitigation and controls for information security or security and HR-related professionals.
-
Combatting Cyber Terrorism
- A Guide to Understanding the Cyber Threat Landscape and Incident Response Planning
- Narrateur(s): Daniel Crespin
- Durée: 6 h et 17 min
- Date de publication: 2024-11-04
- Langue: Anglais
-
Combatting Cyber Terrorism – A guide to understanding the cyber threat landscape and incident response planning, analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Big Tech Tyrants
- How Silicon Valley's Stealth Practices Addict Teens, Silence Speech and Steal Your Privacy
- Auteur(s): Floyd Brown, Todd Cefaratti
- Narrateur(s): Shawn Compton
- Durée: 8 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Big Tech Tyrants boast riches beyond emperors of old but act like juveniles who don't want to grow up. They are modern-day robber barons. Big Tech Tyrants don't know the meaning of privacy, when it comes to you. They try to make you believe they will give their products away for free as a service to society, when really, they are vacuuming your personal data. They use this data to discover your deepest secrets. Big Tech Tyrants is an eye-opening, must-listen book for anyone living in the 21st century.
-
-
We Live in "1984"
- Écrit par Jake L.S. le 2019-09-04
-
Big Tech Tyrants
- How Silicon Valley's Stealth Practices Addict Teens, Silence Speech and Steal Your Privacy
- Narrateur(s): Shawn Compton
- Durée: 8 h et 49 min
- Date de publication: 2019-09-03
- Langue: Anglais
-
"Boy Kings," or Big Tech Tyrants, are considered the most powerful individuals in the world. They're the autocratic aristocrats who run the tech giants in Silicon Valley, and these social platform operators have gained a non-elected (or, should we say, a self-elected) authoritarian power....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26 $ ou 1 crédit
Prix réduit: 22,26 $ ou 1 crédit
-
-
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Auteur(s): Jeffrey Caruso
- Narrateur(s): Mike Lenz
- Durée: 4 h et 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
-
Inside Cyber Warfare (3rd Edition)
- Mapping the Cyber Underworld
- Narrateur(s): Mike Lenz
- Durée: 4 h et 41 min
- Date de publication: 2025-04-29
- Langue: Anglais
-
Cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 14,02 $ ou 1 crédit
Prix réduit: 14,02 $ ou 1 crédit
-
-
-
Cybersecurity for Beginners
- Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams
- Auteur(s): Michael Patel
- Narrateur(s): Kevin Elliott
- Durée: 5 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
With cybersecurity becoming a necessity, Cybersecurity for Beginners offers a clear and actionable guide for safeguarding your personal and professional data. Whether you're preparing for the CompTIA Security+ certification or simply want to understand how to defend against malware and phishing, this book gives you the tools you need to stay safe in the digital world.
-
Cybersecurity for Beginners
- Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams
- Narrateur(s): Kevin Elliott
- Durée: 5 h et 3 min
- Date de publication: 2025-01-13
- Langue: Anglais
-
With cybersecurity becoming a necessity, Cybersecurity for Beginners offers a clear and actionable guide for safeguarding your personal and professional data.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
Hackable
- How to Do Application Security Right
- Auteur(s): Ted Harrington
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application.
-
Hackable
- How to Do Application Security Right
- Narrateur(s): Arthur Rowan
- Durée: 5 h et 49 min
- Date de publication: 2021-06-16
- Langue: Anglais
-
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $ ou 1 crédit
Prix réduit: 25,00 $ ou 1 crédit
-
-
-
The People vs Tech
- How the Internet Is Killing Democracy (and How We Save It)
- Auteur(s): Jamie Bartlett
- Narrateur(s): Sandro Monetti
- Durée: 5 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Internet was meant to set us free. But have we unwittingly handed too much away to shadowy powers behind a wall of code, all manipulated by a handful of Silicon Valley utopians, ad men, and venture capitalists? And, in light of recent data breach scandals around companies like Facebook and Cambridge Analytica, what does that mean for democracy, our delicately balanced system of government that was created long before big data, total information, and artificial intelligence? In this urgent polemic, Jamie Bartlett argues that through our unquestioning embrace of big tech, the building blocks of democracy are slowly being removed.
-
-
Doesn't load. This book won't play on my device at
- Écrit par Utilisateur anonyme le 2018-08-02
-
The People vs Tech
- How the Internet Is Killing Democracy (and How We Save It)
- Narrateur(s): Sandro Monetti
- Durée: 5 h et 5 min
- Date de publication: 2018-04-06
- Langue: Anglais
-
The Internet was meant to set us free. But have we unwittingly handed too much away to shadowy powers behind a wall of code, all manipulated by a handful of Silicon Valley utopians, ad men, and venture capitalists? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,48 $ ou 1 crédit
Prix réduit: 17,48 $ ou 1 crédit
-
-
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): Chris Pace
- Durée: 2 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- Narrateur(s): Chris Pace
- Durée: 2 h et 37 min
- Date de publication: 2019-01-15
- Langue: Anglais
-
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $ ou 1 crédit
Prix réduit: 8,71 $ ou 1 crédit
-
-
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet. A global, multistakeholder community made up of many organizations shapes internet policy, operations, and security. But the ongoing and increasing reliance on the internet underscores the need to understand the risks to its underlying architecture.
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $ ou 1 crédit
Prix réduit: 8,71 $ ou 1 crédit
-
-
-
Cyber Security
- Learn the Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies
- Auteur(s): Noah Zhang, Dana Onyshko
- Narrateur(s): Gary Westphalen
- Durée: 3 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Companies that can use technology wisely and well are booming, and companies that make bad or no technology choices collapse and disappear. The cloud, smart devices, and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. The bad actors are in on this, too, and it creates a real problem right now for every individual and business.
-
Cyber Security
- Learn the Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies
- Narrateur(s): Gary Westphalen
- Durée: 3 h et 42 min
- Date de publication: 2020-10-13
- Langue: Anglais
-
Companies that can use technology wisely and well are booming, and companies that make bad or no technology choices collapse and disappear. The cloud, smart devices, and the ability to connect almost any object to the internet are an essential landscape to use....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $ ou 1 crédit
Prix réduit: 18,74 $ ou 1 crédit
-