Internet Security
-
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity experts agree: No one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls.
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2022-01-14
- Langue: Anglais
-
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
NSA Secrets
- Government Spying in the Internet Age
- Auteur(s): The Washington Post
- Narrateur(s): James Adams
- Durée: 6 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The NSA's extensive surveillance program has riveted America as the public questions the threats to their privacy. As reported by The Washington Post, in their Pulitzer Prize-winning coverage of whistleblower Edward Snowden's NSA leaks, NSA Secrets delves into the shadowy world of information gathering, exposing how data about you is being gathered every day. From his earliest encrypted exchanges with reporters, Edward Snowden knew he was a man in danger.
-
NSA Secrets
- Government Spying in the Internet Age
- Narrateur(s): James Adams
- Durée: 6 h et 20 min
- Date de publication: 2015-01-13
- Langue: Anglais
- NSA Secrets delves into the shadowy world of information gathering, exposing how data about you is being gathered every day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,40$ ou 1 crédit
Prix réduit: 26,40$ ou 1 crédit
-
-
-
A Cure for the Common Scam
- A Non-Technical Guide for Navigating the Pitfalls of the Internet
- Auteur(s): Kyle Jekot CFE
- Narrateur(s): Derek Dysart
- Durée: 1 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
We all get the calls. We all get the emails. But can you tell the difference between a legitimate call or email...and a scam? Scammers are working harder than ever before to take advantage of you, your identity, and your money. With some guidance and perspective, A Cure for the Common Scam will help walk you through steps you can take to protecting yourself against the common scams of today. Explained in nontechnical, straightforward, and practical terms. You do not have to fall victim to the schemes of scammers.
-
A Cure for the Common Scam
- A Non-Technical Guide for Navigating the Pitfalls of the Internet
- Narrateur(s): Derek Dysart
- Durée: 1 h et 11 min
- Date de publication: 2021-11-03
- Langue: Anglais
-
We all get the calls. We all get the emails. But can you tell the difference between a legitimate call or email...and a scam? Scammers are working harder than ever before to take advantage of you, your identity, and your money....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Vote.com
- How Big-Money Lobbyists are Losing Influence, and the Internet is Giving Power to the People
- Auteur(s): Dick Morris
- Narrateur(s): uncredited
- Durée: 3 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Politics as usual - isn't anymore. Tear up what you know or think you know about politics. It's all changing. Today, information, opinion, and raw data abound on the Internet, unfiltered and unvarnished by press secretaries, reporters or spin doctors. The Internet has sent the information revolution into reverse, letting us talk back to our political leaders, and the result is a cultural revolution.
-
Vote.com
- How Big-Money Lobbyists are Losing Influence, and the Internet is Giving Power to the People
- Narrateur(s): uncredited
- Durée: 3 h et 25 min
- Date de publication: 2000-01-07
- Langue: Anglais
- Politics as usual - isn't anymore. Tear up what you know or think you know about politics. It's all changing. For thirty years the print and broadcast media...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 10,67$ ou 1 crédit
Prix réduit: 10,67$ ou 1 crédit
-
-
-
The SOPA & PIPA Conspiracy
- Taking CONTROL through Internet Censorship
- Auteur(s): Jeremy Miles
- Narrateur(s): Luke Smith
- Durée: 1 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Have you ever wondered what it would be like if the United States became a clone of China or Burma? That's what almost happened with the SOPA and PIPA bills which attempted to pass into law.
The SOPA & PIPA Conspiracy explains these horrible censorship laws, and what they would have meant, and WILL mean if they ever pass. Learn how you can prevent the destruction of the internet, and ward off any future bills which allow total Government control or censorship.
-
The SOPA & PIPA Conspiracy
- Taking CONTROL through Internet Censorship
- Narrateur(s): Luke Smith
- Durée: 1 h et 13 min
- Date de publication: 2014-04-08
- Langue: Anglais
- Have you ever wondered what it would be like if the United States became a clone of China or Burma?...
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Guarding Against Online Identity Theft: A Simple Guide to Online Security
- Auteur(s): Tim Trott
- Narrateur(s): Tim Trott
- Durée: 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The internet can be a fearful and frightening place, especially when we hear about things like online identity theft. As scary as they may seem, there are some simple steps that anyone can take to protect ourselves from those dangers. This audiobook will explain what those threats are, and what you can use to guard against being a victim. It’s all broken down in simple terms you can understand. Once you have a basic understanding of how the pieces fit together, you can then protect yourself from danger.
-
-
Well done
- Écrit par You’re right about that le 2022-02-25
-
Guarding Against Online Identity Theft: A Simple Guide to Online Security
- Narrateur(s): Tim Trott
- Durée: 47 min
- Date de publication: 2022-02-17
- Langue: Anglais
-
The internet can be a fearful and frightening place, especially when we hear about things like online identity theft. As scary as they may seem, there are some simple steps that anyone can take to protect ourselves from those dangers....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
Cybersecurity Basics
- Cyber Attacks, Network Security, and Threat Prevention
- Auteur(s): Pete Michaels
- Narrateur(s): Steven McGarry
- Durée: 3 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Take this chance to learn about cybersecurity, because the criminals hiding behind the screen are ready to strike - and you won’t see them coming! If you have felt exposed online, then this book is for you. In this book, I take you on a journey and show you how you are exposed in the cyberworld. Together, we will learn about the fundamentals of cybersecurity and discover the tools that hackers use to invade your privacy, steal your information, and hold you at ransom.
-
Cybersecurity Basics
- Cyber Attacks, Network Security, and Threat Prevention
- Narrateur(s): Steven McGarry
- Durée: 3 h et 6 min
- Date de publication: 2021-09-22
- Langue: Anglais
-
Take this chance to learn about cybersecurity, because the criminals hiding behind the screen are ready to strike - and you won’t see them coming! If you have felt exposed online, then this book is for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Senior Cyber
- Best Security Practices for Your Golden Years
- Auteur(s): Scott N. Schober, Craig W. Schober
- Narrateur(s): Alan Sklar
- Durée: 3 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
From the basics of the internet to the fight for healthcare privacy and security that is so critical to our aging population, Senior Cyber offers simple advice and expertise for all levels of internet experience. Whether you are a parent, grandparent, great-grandparent, or the son or daughter of one, this book is designed with your concerns in mind. Practical cybersecurity advice and examples affecting seniors put Senior Cyber atop any listening list for those helping others or themselves to stay cyber safe.
-
Senior Cyber
- Best Security Practices for Your Golden Years
- Narrateur(s): Alan Sklar
- Durée: 3 h et 51 min
- Date de publication: 2021-03-24
- Langue: Anglais
-
From the basics of the internet to the fight for healthcare privacy and security that is so critical to our aging population, Senior Cyber offers simple advice and expertise for all levels of internet experience....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Developer and Vendor Challenges Identity and Access Management
- Auteur(s): National Security Agency (NSA), Infrastructure Security Agency (CISA)
- Narrateur(s): Tom Brooks
- Durée: 2 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Since the introduction of multi-user computer systems, user authentication has primarily relied on the use of usernames and passwords. To strengthen the authentication process, Multi-Factor Authentication (MFA) requires the user to present multiple elements in different categories, or “factors,” as part of an authentication attempt. These factors are something you have, something you know, and something you are.
-
Developer and Vendor Challenges Identity and Access Management
- Narrateur(s): Tom Brooks
- Durée: 2 h et 20 min
- Date de publication: 2023-10-16
- Langue: Anglais
-
Since the introduction of multi-user computer systems, user authentication has primarily relied on the use of usernames and passwords....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
CISA Strategic Plan 2023-2025
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
I am proud to share the 2023–2025 CISA Strategic Plan, the first comprehensive Strategic Plan since CISA was established as an agency in 2018. The strategic plan represents a forward-leaning, unified approach to achieving our vision of ensuring secure and resilient critical infrastructure for the American people.
-
CISA Strategic Plan 2023-2025
- Narrateur(s): Tom Brooks
- Durée: 2 h et 42 min
- Date de publication: 2023-09-25
- Langue: Anglais
-
I am proud to share the 2023–2025 CISA Strategic Plan, the first comprehensive Strategic Plan since CISA was established as an agency in 2018....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
NSA Tips
- Blacklotus Mitigation Guide
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
BlackLotus is a recently publicized malware product garnering significant attention within tech media. Similar to 2020’s BootHole (CVE-2020-10713), BlackLotus takes advantage of a boot loader flaw—specifically CVE-2022-21894 Secure Boot bypass known as “Baton Drop”—to take control of an endpoint from the earliest phase of software boot.
-
NSA Tips
- Blacklotus Mitigation Guide
- Narrateur(s): Tom Brooks
- Durée: 1 h et 44 min
- Date de publication: 2023-07-03
- Langue: Anglais
-
BlackLotus is a recently publicized malware product garnering significant attention within tech media. Similar to 2020’s BootHole (CVE-2020-10713), BlackLotus takes advantage of a boot loader flaw—specifically CVE-2022-21894 Secure Boot bypass known as “Baton Drop”....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The CISA Tips On: Guide to Securing Remote Access Software
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Remote access software and tools comprise a broad array of capabilities used to maintain and improve IT, operational technology (OT), and industrial control systems (ICS) services; they allow a proactive and flexible approach for organizations to remotely oversee networks, computers, and other devices.
-
The CISA Tips On: Guide to Securing Remote Access Software
- Narrateur(s): Tom Brooks
- Durée: 1 h et 53 min
- Date de publication: 2023-06-22
- Langue: Anglais
-
Remote access software and tools comprise a broad array of capabilities used to maintain and improve IT, operational technology (OT), and industrial control systems (ICS) services....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The NSA Tips
- Hunting Russian Intelligence "Snake" Malware: May 2023
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive targets. To conduct operations using this tool, the FSB created a covert peer-to-peer (P2P) network of numerous Snake-infected computers worldwide.
-
The NSA Tips
- Hunting Russian Intelligence "Snake" Malware: May 2023
- Narrateur(s): Tom Brooks
- Durée: 3 h et 11 min
- Date de publication: 2023-05-30
- Langue: Anglais
-
The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cybersecurity Best Practices for Smart Cities
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
These cybersecurity authorities—herein referred to as “authoring organizations”—are aware that communities may seek cost-savings and quality-of-life improvements through the digital transformation of infrastructure to create “smart cities".
-
Cybersecurity Best Practices for Smart Cities
- Narrateur(s): Tom Brooks
- Durée: 2 h et 2 min
- Date de publication: 2023-05-01
- Langue: Anglais
-
These cybersecurity authorities—herein referred to as “authoring organizations”—are aware that communities may seek cost-savings and quality-of-life improvements through the digital transformation of infrastructure to create “smart cities"....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Best Practices for Securing Your Home Network
- Cybersecurity Information February 2023
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Don't be a victim! Malicious cyber actors may leverage your home network to gain access to personal, private, and confidential information. Help protect yourself, your family, and your work by practicing cybersecurity-aware behaviors, observing some basic configuration guidelines, and implementing the following mitigations on your home network.
-
Best Practices for Securing Your Home Network
- Cybersecurity Information February 2023
- Narrateur(s): Tom Brooks
- Durée: 1 h et 33 min
- Date de publication: 2023-04-18
- Langue: Anglais
-
Don't be a victim! Malicious cyber actors may leverage your home network to gain access to personal, private, and confidential information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Chinese State-Sponsored Cyber Operations
- Observed TTPs
- Auteur(s): The National Security Agency CISA and FBI
- Narrateur(s): Tom Brooks
- Durée: 2 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI) assess that People’s Republic of China's state-sponsored malicious cyberactivity is a major threat to the US and allied cyberspace assets.
-
Chinese State-Sponsored Cyber Operations
- Observed TTPs
- Narrateur(s): Tom Brooks
- Durée: 2 h et 16 min
- Date de publication: 2021-07-29
- Langue: Anglais
-
The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI) assess that People’s Republic of China's state-sponsored malicious cyberactivity is a major threat to the US and allied cyberspace assets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The World of Cybersecurity + Cyber Essentials Starter Kit
- Everything You Need to Know About It + The Basics for Building a Culture of Cyber Readiness
- Auteur(s): Tom Brooks, Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 10 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Reducing your organization’s cyber risks requires a holistic approach - similar to the approach you would take to address other operational risks. As with other risks, cyber risks can threaten. Managing cyber risks requires building a culture of cyber readiness.
-
The World of Cybersecurity + Cyber Essentials Starter Kit
- Everything You Need to Know About It + The Basics for Building a Culture of Cyber Readiness
- Narrateur(s): Tom Brooks
- Durée: 3 h et 10 min
- Date de publication: 2021-07-08
- Langue: Anglais
-
Reducing your organization’s cyber risks requires a holistic approach - similar to the approach you would take to address other operational risks. As with other risks, cyber risks can threaten. Managing cyber risks requires building a culture of cyber readiness....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cyber Essentials Starter Kit
- The Basics for Building a Culture of Cyber Readiness
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Determine how much of your organization’s operations are dependent on IT. Consider how much your organization relies on information technology to conduct business and make it a part of your culture to plan for contingencies in the event of a cyber incident. Identify and prioritize your organization’s critical assets and the associated impacts to operations if an incident were to occur.
-
Cyber Essentials Starter Kit
- The Basics for Building a Culture of Cyber Readiness
- Narrateur(s): Tom Brooks
- Durée: 1 h et 28 min
- Date de publication: 2021-07-07
- Langue: Anglais
-
Determine how much of your organization’s operations are dependent on IT. Consider how much your organization relies on information technology to conduct business and make it a part of your culture to plan for contingencies in the event of a cyber incident....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-