Internet Security
-
-
Cyber Security - 3 Book Combo
- Cyber Essentials - Cybersecurity for Small Business - Is Cyber Deterrence Possible?
- Auteur(s): Cybersecurity and Infrastructure Security Agency - FTC - US Department of Defense
- Narrateur(s): Tom Brooks
- Durée: 3 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As a leader, you need to drive your organization’s approach to cybersecurity as you would any other hazard (e.g. how you identify risk, reduce vulnerabilities, and plan for contingencies). This requires an investment of time and money, as well as the collective buy-in of your management team. Your investment drives actions and activities, and these build and sustain a culture of cybersecurity.
-
Cyber Security - 3 Book Combo
- Cyber Essentials - Cybersecurity for Small Business - Is Cyber Deterrence Possible?
- Narrateur(s): Tom Brooks
- Durée: 3 h et 16 min
- Date de publication: 2021-07-15
- Langue: Anglais
-
As a leader, you need to drive your organization’s approach to cybersecurity as you would any other hazard (e.g. how you identify risk, reduce vulnerabilities, and plan for contingencies). This requires an investment of time and money and the collective buy-in of your management team....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Confessions of a CIA Spy
- The Art of Human Hacking
- Auteur(s): Peter Warmka
- Narrateur(s): Gary Williams
- Durée: 3 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies that he and other threat actors use to breach the security of their targets, whether they’re high-profile individuals or entire organizations.
-
Confessions of a CIA Spy
- The Art of Human Hacking
- Narrateur(s): Gary Williams
- Durée: 3 h et 42 min
- Date de publication: 2021-03-02
- Langue: Anglais
-
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies to breach the security of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet. A global, multistakeholder community made up of many organizations shapes internet policy, operations, and security. But the ongoing and increasing reliance on the internet underscores the need to understand the risks to its underlying architecture.
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Google Bomb
- The Untold Story of the 11.3M Verdict That Changed the Way We Use the Internet
- Auteur(s): John W. Dozier Jr./, Sue Scheff
- Narrateur(s): Susan Bennet
- Durée: 7 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In today's technology-dependent world, the Internet has become a legal but lethal weapon against the privacy and reputations of its users. Based on Sue Scheff's landmark Internet defamation case, which gave a face to online harassment, cyberbulling, privacy invasion, and Google bombs, and stirred Internet regulation and free-speech debates, Google Bomb arms listeners with information, legal advice, and reputation-defense tips.
-
Google Bomb
- The Untold Story of the 11.3M Verdict That Changed the Way We Use the Internet
- Narrateur(s): Susan Bennet
- Durée: 7 h et 53 min
- Date de publication: 2009-09-29
- Langue: Anglais
- In today's technology-dependent world, the Internet has become a legal but lethal weapon against the privacy and reputations of its users....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,40$ ou 1 crédit
Prix réduit: 26,40$ ou 1 crédit
-
-
-
The Trust Manifesto
- What You Need to Do to Create a Better Internet
- Auteur(s): Damian Bradfield
- Narrateur(s): Damian Bradfield, Richard Hughes, Kristin Atherton
- Durée: 6 h et 54 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
From the moment we wake up and unlock our phones, we're producing data. We offer up our unique fingerprint to the online world, scan our route to work, listen to a guided meditation or favourite playlist, slide money around, share documents and update our social media accounts. We reach for our phones up to 200 times a day, not knowing which companies are storing, using, selling and manipulating our data.
-
The Trust Manifesto
- What You Need to Do to Create a Better Internet
- Narrateur(s): Damian Bradfield, Richard Hughes, Kristin Atherton
- Durée: 6 h et 54 min
- Date de publication: 2019-10-10
- Langue: Anglais
-
From the moment we wake up and unlock our phones, we're producing data. We offer up our unique fingerprint to the online world, scan our route to work, listen to a guided meditation or favourite playlist, slide money around, share documents and update our social media accounts....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,77$ ou 1 crédit
Prix réduit: 19,77$ ou 1 crédit
-
-
-
Our Data, Ourselves (First Edition)
- A Personal Guide to Digital Privacy
- Auteur(s): Jacqueline D. Lipton
- Narrateur(s): Corinne Davies
- Durée: 9 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides listeners through important issues involving technology, data collection, and digital privacy as they apply to our daily lives.
-
Our Data, Ourselves (First Edition)
- A Personal Guide to Digital Privacy
- Narrateur(s): Corinne Davies
- Durée: 9 h et 44 min
- Date de publication: 2022-11-22
- Langue: Anglais
-
A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Cómo protegerte del phishing [How to Protect Yourself from Phishing]
- Evita que te roben tu información y tu dinero [Prevent Your Information and Money from Being Stolen]
- Auteur(s): Juanjo Ramos
- Narrateur(s): Juanjo Ramos
- Durée: 41 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
El phishing es un tipo de ingeniería social en el que un atacante envía un mensaje fraudulento (por ejemplo, suplantado la identidad de una entidad bancaria) diseñado para engañar a una persona para que revele información confidencial al atacante, o bien para implementar software malicioso en el equipo informático de la víctima con el objetivo de secuestrar sus datos.
-
Cómo protegerte del phishing [How to Protect Yourself from Phishing]
- Evita que te roben tu información y tu dinero [Prevent Your Information and Money from Being Stolen]
- Narrateur(s): Juanjo Ramos
- Durée: 41 min
- Date de publication: 2022-11-08
- Langue: Espagnol
-
El phishing es un tipo de ingeniería social en el que un atacante envía un mensaje fraudulento (por ejemplo, suplantado la identidad de una entidad bancaria) diseñado para engañar a una persona para que revele información confidencial al atacante....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,08$ ou 1 crédit
Prix réduit: 8,08$ ou 1 crédit
-
-
-
Cybersecurity
- The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
- Auteur(s): Trust Genics
- Narrateur(s): Leon Tietz
- Durée: 3 h et 48 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk. At an individual level, a cybersecurity attack can result in everything from identity theft to extortion attempts, to the loss of important data like family photos. However, there are simple things you can do to protect yourself, your family, and your work.
-
Cybersecurity
- The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
- Narrateur(s): Leon Tietz
- Durée: 3 h et 48 min
- Date de publication: 2020-03-07
- Langue: Anglais
-
Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or even put your family at risk....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,08$ ou 1 crédit
Prix réduit: 9,08$ ou 1 crédit
-
-
-
Kali Linux: Testing Your Network
- How to Test Infrastructure Security with Security Testing and Penetration Testing
- Auteur(s): Frank Eltrinos
- Narrateur(s): Rudy Norman
- Durée: 3 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Increasingly, hackers are becoming a bigger problem for both businesses and individuals. If they decide to target your device, you could be locked out of your own systems or lose valuable information. Sadly, many people don’t know how to protect their networks, leaving them open to the stress and anxiety that these attacks can cause. Thankfully, you can learn the skills required to secure your network. This comprehensive audiobook will take you through everything you need to know.
-
Kali Linux: Testing Your Network
- How to Test Infrastructure Security with Security Testing and Penetration Testing
- Narrateur(s): Rudy Norman
- Durée: 3 h et 39 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
Increasingly, hackers are becoming a bigger problem for both businesses and individuals. If they decide to target your device, you could be locked out of your own systems or lose valuable information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Hacking
- Hacking for Beginners, Basic Security & How to Hack
- Auteur(s): Jacob Hatcher
- Narrateur(s): Luke Rounda
- Durée: 3 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government. This book lists the various ways hackers can breach the security of an individual or an organization's data and network. Its information is for learning purposes only, and the hacking techniques should not be tried because it is a crime to hack someone's personal details without his or her consent.
-
Hacking
- Hacking for Beginners, Basic Security & How to Hack
- Narrateur(s): Luke Rounda
- Durée: 3 h et 34 min
- Date de publication: 2017-01-06
- Langue: Anglais
- Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,78$ ou 1 crédit
Prix réduit: 19,78$ ou 1 crédit
-
-
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Auteur(s): Solis Tech
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover everything you need to know about hacking. Step by step to increase your hacking skill set. Learn how to penetrate computer systems. All your basic knowledge in one download! You need to get it now to know what's inside, as it can't be shared here!
-
Hacking
- How to Hack Computers, Basic Security, and Penetration Testing
- Narrateur(s): Millian Quinteros
- Durée: 2 h et 21 min
- Date de publication: 2015-12-21
- Langue: Anglais
- Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught? Download Hacking to discover....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34$ ou 1 crédit
Prix réduit: 9,34$ ou 1 crédit
-
-
-
Hacking
- Basic Computer Security and Penetration Testing
- Auteur(s): John Slavio
- Narrateur(s): Steve Biddle
- Durée: 1 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Have you wondered what hacking is all about? How do people hack and what are some basic precautions you can take to prevent being hacked? It seems like everyone is being hacked. Celebrities, politicians, large organizations, banks, schools, universities etc. Well, how does this happen? What are the different kinds of attacks? Is there any way you can improve your safety? This book answers all.
-
Hacking
- Basic Computer Security and Penetration Testing
- Narrateur(s): Steve Biddle
- Durée: 1 h et 4 min
- Date de publication: 2016-12-29
- Langue: Anglais
- Do you have a desktop computer, a laptop or even a smartphone? Then you probably have heard the term computer security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Hacking
- Penetration Testing, Basic Security, and How To Hack
- Auteur(s): Justin Hatmaker
- Narrateur(s): Richard D. Hurd
- Durée: 2 h et 10 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you curious about the world of hacking? Do you know how hackers break down passwords and break into systems? Would you like to protect your computer systems - and your personal information? With Justin Hatmaker's Hacking: Penetration Testing, Basic Security, and How to Hack, you can do all this and more! What types of hacking attacks are out there? How can you defend yourself?
-
Hacking
- Penetration Testing, Basic Security, and How To Hack
- Narrateur(s): Richard D. Hurd
- Durée: 2 h et 10 min
- Date de publication: 2017-02-27
- Langue: Anglais
- In Hacking: Penetration Testing, Basic Security, and How to Hack, Justin teaches you how to become a basic level hacker. Without complicated jargon and high-level coding....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- Auteur(s): Scott N. Schober, Craig W. Schober
- Narrateur(s): Stephen Bowlby
- Durée: 7 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now, joined by his brother Craig, the two have set their sights on the biggest target of all: small businesses. Throughout Cybersecurity Is Everybody's Business, Scott and Craig contextualize the impact of these cyber attacks on your small business and daily lives to provide expert insight and a plan of attack for fending off future security breaches.
-
Cybersecurity Is Everybody's Business
- Solve the Security Puzzle for Your Small Business and Home
- Narrateur(s): Stephen Bowlby
- Durée: 7 h et 15 min
- Date de publication: 2019-10-22
- Langue: Anglais
-
Since the publication of his first book Hacked Again, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- Auteur(s): Recorded Future
- Narrateur(s): Chris Pace
- Durée: 2 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- Narrateur(s): Chris Pace
- Durée: 2 h et 37 min
- Date de publication: 2019-01-15
- Langue: Anglais
-
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Hacking
- A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing
- Auteur(s): John Slavio
- Narrateur(s): T. W. Ashworth
- Durée: 1 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
All you wanted to know about hacking and computer security. This book will teach you everything you need to know about hacking, the history of hacking, the types of hacking, and security measures that you should undertake. This book will teach you about the techniques you can use to prank your friends or spy on your significant other (maybe). It can also get you started on your journey towards being an ethical hacker, which is a fast-growing, in-demand field.
-
Hacking
- A Beginners' Guide to Computer Hacking, Basic Security and Penetration Testing
- Narrateur(s): T. W. Ashworth
- Durée: 1 h et 19 min
- Date de publication: 2017-05-11
- Langue: Anglais
- All you wanted to know about hacking and computer security....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
Censorship's Grave
- Observations, Tools, and Tips for Taking the Internet Back from Autocracies
- Auteur(s): Philip Collier
- Narrateur(s): Philip G Collier
- Durée: 4 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Censorship's Grave looks at modern methods of circumventing censorship and counteracting effects of information warfare. It argues that autocrats are losing the battle of censorship in an information age they no longer control. Unfortunately, the new information age contains a spectrum of arguments - from truth to blatant lies. The book was written by an author who has traveled extensively in countries with restricted media and used circumvention tools in all of them. It conveys a warning to not trade one disinfo system for another one.
-
Censorship's Grave
- Observations, Tools, and Tips for Taking the Internet Back from Autocracies
- Narrateur(s): Philip G Collier
- Durée: 4 h et 5 min
- Date de publication: 2023-05-11
- Langue: Anglais
-
Censorship's Grave looks at modern methods of circumventing censorship and counteracting effects of information warfare. It argues that autocrats are losing the battle of censorship in an information age they no longer control.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
The People vs Tech
- How the Internet Is Killing Democracy (and How We Save It)
- Auteur(s): Jamie Bartlett
- Narrateur(s): Sandro Monetti
- Durée: 5 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Internet was meant to set us free. But have we unwittingly handed too much away to shadowy powers behind a wall of code, all manipulated by a handful of Silicon Valley utopians, ad men, and venture capitalists? And, in light of recent data breach scandals around companies like Facebook and Cambridge Analytica, what does that mean for democracy, our delicately balanced system of government that was created long before big data, total information, and artificial intelligence? In this urgent polemic, Jamie Bartlett argues that through our unquestioning embrace of big tech, the building blocks of democracy are slowly being removed.
-
-
Doesn't load. This book won't play on my device at
- Écrit par Utilisateur anonyme le 2018-08-02
-
The People vs Tech
- How the Internet Is Killing Democracy (and How We Save It)
- Narrateur(s): Sandro Monetti
- Durée: 5 h et 5 min
- Date de publication: 2018-04-06
- Langue: Anglais
-
The Internet was meant to set us free. But have we unwittingly handed too much away to shadowy powers behind a wall of code, all manipulated by a handful of Silicon Valley utopians, ad men, and venture capitalists? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 17,48$ ou 1 crédit
Prix réduit: 17,48$ ou 1 crédit
-
-
-
Cybersecurity for Beginners
- Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide
- Auteur(s): Kevin Clark
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every day we hear new stories about people being attacked by cybercriminals. Companies being hacked and losing millions of people's personal details or being locked out of their systems and held to ransom.
-
Cybersecurity for Beginners
- Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Date de publication: 2022-10-13
- Langue: Anglais
-
Every day we hear new stories about people being attacked by cybercriminals. Companies being hacked and losing millions of people's personal details or being locked out of their systems and held to ransom....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 7,06$ ou 1 crédit
Prix réduit: 7,06$ ou 1 crédit
-
-
-
NIST 800 Control Families in Each RMF Step (NIST 800 Cybersecurity)
- RMF ISSO: NIST 800-53 Controls, Book 2
- Auteur(s): Bruce Brown
- Narrateur(s): Frank Block
- Durée: 4 h et 26 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process. It is written by someone in the field in layman's terms, with practical use in mind. This book is not a replacement for the NIST 800 special publications. It is a supplemental resource that will give context and meaning to the controls for organizations and cybersecurity professionals tasked with interpreting the security controls.
-
NIST 800 Control Families in Each RMF Step (NIST 800 Cybersecurity)
- RMF ISSO: NIST 800-53 Controls, Book 2
- Narrateur(s): Frank Block
- Série: NIST 800 Cybersecurity, Livre 2
- Durée: 4 h et 26 min
- Date de publication: 2022-08-11
- Langue: Anglais
-
This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process. It is written by someone in the field in layman's terms, with practical use in mind....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,24$ ou 1 crédit
Prix réduit: 25,24$ ou 1 crédit
-