Internet Security
-
-
The Language of Deception
- Weaponizing Next Generation AI
- Auteur(s): Justin Hutchens
- Narrateur(s): Mike Chamberlain
- Durée: 10 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes. In the book, you will explore the history of social engineering and social robotics, the psychology of deception, considerations of machine sentience and consciousness, and the history of how technology has been weaponized in the past.
-
The Language of Deception
- Weaponizing Next Generation AI
- Narrateur(s): Mike Chamberlain
- Durée: 10 h et 38 min
- Date de publication: 2024-02-20
- Langue: Anglais
-
Artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Auteur(s): George Finney, John Kindervag - foreword
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- Narrateur(s): Daniel Thomas May
- Durée: 7 h et 51 min
- Date de publication: 2022-10-04
- Langue: Anglais
-
George Finney, chief security officer at Southern Methodist University, delivers a practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Zero Trust Architecture
- Networking Technology: Security
- Auteur(s): Cindy Green-Ortiz, Brandon Fowler, David Houck, Autres
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Zero Trust Architecture
- Networking Technology: Security
- Narrateur(s): Alex Freeman
- Durée: 11 h et 36 min
- Date de publication: 2024-04-11
- Langue: Anglais
-
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,27$ ou 1 crédit
Prix réduit: 31,27$ ou 1 crédit
-
-
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Auteur(s): Gabriella Coleman
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption. She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
-
Hacker, Hoaxer, Whistleblower, Spy
- The Many Faces of Anonymous
- Narrateur(s): Tavia Gilbert
- Durée: 13 h et 39 min
- Date de publication: 2017-01-31
- Langue: Anglais
- Anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,82$ ou 1 crédit
Prix réduit: 22,82$ ou 1 crédit
-
-
-
Hacking: Hacking Firewalls & Bypassing Honeypots
- Auteur(s): Alex Wagner
- Narrateur(s): Jack Bellows
- Durée: 3 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. The main focus of this audiobook is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems, or Honeypots work. Your listening of this audiobook will boost your knowledge on what is possible in today’s hacking world and help you to become an Ethical Hacker aka Penetration Tester.
-
Hacking: Hacking Firewalls & Bypassing Honeypots
- Narrateur(s): Jack Bellows
- Durée: 3 h et 44 min
- Date de publication: 2020-05-22
- Langue: Anglais
-
In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 13,52$ ou 1 crédit
Prix réduit: 13,52$ ou 1 crédit
-
-
-
Cybersecurity Essentials
- Auteur(s): Charles J. Brooks, Christopher Grow, Philip Craig, Autres
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Awful as an e-book
- Écrit par Mac le 2021-07-25
-
Cybersecurity Essentials
- Narrateur(s): Ryan Burke
- Durée: 17 h et 27 min
- Date de publication: 2018-10-30
- Langue: Anglais
-
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53$ ou 1 crédit
Prix réduit: 37,53$ ou 1 crédit
-
-
-
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Auteur(s): Zeynep Tufekci
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
An incisive observer, writer, and participant in today's social movements, Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests, and why they have difficulty persisting in their long-term quests for change.
-
-
A must read for those interested in social media
- Écrit par Bijan le 2018-09-13
-
Twitter and Tear Gas
- The Power and Fragility of Networked Protest
- Narrateur(s): Carly Robins
- Durée: 13 h et 55 min
- Date de publication: 2017-05-16
- Langue: Anglais
- Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests - how they form, how they operate differently from past protests....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-
-
-
Cybersecurity for Beginners
- Auteur(s): Raef Meeuwisse
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
Cybersecurity for Beginners
- Narrateur(s): Danny Eastman
- Durée: 7 h et 8 min
- Date de publication: 2017-09-21
- Langue: Anglais
- This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Auteur(s): Christopher Hadnagy, Michele Fincher, Robin Dreeke - foreword
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website.
-
Phishing Dark Waters
- The Offensive and Defensive Sides of Malicious Emails
- Narrateur(s): Christopher Hadnagy, Michele Fincher
- Durée: 5 h et 25 min
- Date de publication: 2023-11-21
- Langue: Anglais
-
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 14,47$ ou 1 crédit
Prix réduit: 14,47$ ou 1 crédit
-
-
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- Auteur(s): John P. Carlin, Garrett M. Graff
- Narrateur(s): Kevin Stillwell
- Durée: 16 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back. In this dramatic audiobook, former assistant attorney general John P. Carlin takes listeners to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies.
-
-
Eye-opening!
- Écrit par Bradley Banks le 2019-02-01
-
Dawn of the Code War
- America's Battle Against Russia, China, and the Rising Global Cyber Threat
- Narrateur(s): Kevin Stillwell
- Durée: 16 h et 59 min
- Date de publication: 2018-10-16
- Langue: Anglais
-
The inside story of how America's enemies launched a cyberwar against us - and how we've learned to fight back....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 39,38$ ou 1 crédit
Prix réduit: 39,38$ ou 1 crédit
-
-
-
Amazon Web Services in Action
- Auteur(s): Andreas Wittig, Michael Wittig
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability.
-
Amazon Web Services in Action
- Narrateur(s): Aiden Humphreys
- Durée: 9 h et 55 min
- Date de publication: 2018-12-12
- Langue: Anglais
-
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The audiobook will teach you about the most important services on AWS. You will also learn about best practices regarding security, high availability, and scalability....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Reset
- Reclaiming the Internet for Civil Society
- Auteur(s): Ronald J. Deibert
- Narrateur(s): Ronald J. Deibert
- Durée: 11 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Drawing from the cutting-edge research of the Citizen Lab, the world-renowned digital security research group that he founded and directs, Ronald J. Deibert exposes the impacts of the communications ecosystem on civil society. He tracks a mostly unregulated surveillance industry, innovations in technologies of remote control, superpower policing practices, dark PR firms and highly profitable hack-for-hire services feeding off rivers of poorly secured personal data.
-
Reset
- Reclaiming the Internet for Civil Society
- Narrateur(s): Ronald J. Deibert
- Durée: 11 h et 19 min
- Date de publication: 2021-10-19
- Langue: Anglais
-
Ronald J. Deibert exposes the disturbing influence and impact of the internet on politics, the economy, the environment and humanity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 36,21$ ou 1 crédit
Prix réduit: 36,21$ ou 1 crédit
-
-
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Auteur(s): Clint Watts
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns that have become the cutting edge of modern warfare - and how we can protect ourselves against them. Clint Watts electrified the nation when he testified regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind.
-
-
Interesting and engaging
- Écrit par Mark Dynna le 2018-07-18
-
Messing with the Enemy
- Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Narrateur(s): Joe Knezevich
- Durée: 9 h et 34 min
- Date de publication: 2018-05-29
- Langue: Anglais
-
A former FBI Special Agent, US Army officer, and leading cyber-security expert offers a look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare - and how we can protect ourselves and our country against them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,46$ ou 1 crédit
Prix réduit: 31,46$ ou 1 crédit
-
-
-
The NIST Framework (CSF) 2.0
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 2 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization - regardless of its size, sector, or maturity - to better understand, assess, prioritize, and communicate its cybersecurity efforts.
-
-
just reading an online free PFF
- Écrit par Haidy Giratallah le 2024-05-28
-
The NIST Framework (CSF) 2.0
- Narrateur(s): Tom Brooks
- Durée: 2 h et 33 min
- Date de publication: 2024-04-02
- Langue: Anglais
-
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Ransomware Protection Playbook
- Auteur(s): Roger A. Grimes
- Narrateur(s): Danny Campbell
- Durée: 10 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.
-
Ransomware Protection Playbook
- Narrateur(s): Danny Campbell
- Durée: 10 h et 28 min
- Date de publication: 2021-12-31
- Langue: Anglais
-
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- Auteur(s): Learn Computer Hacking in Deep
- Narrateur(s): Jowanna Lewis
- Durée: 3 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization. Unless and until you are unaware of the basics, you will not be able to use this software. In fact, for carrying out an effective form of ethical hacking, you will need to learn about the various attacks along with the forms of networks. You can easily find the information in this audiobook.
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- Narrateur(s): Jowanna Lewis
- Durée: 3 h et 23 min
- Date de publication: 2020-02-11
- Langue: Anglais
-
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cybersecurity Guard
- Unlocking the Secrets to Detect, Prevent, and Shield Your Devices from Cyber Threats and Scams
- Auteur(s): Joseph Mendoza
- Narrateur(s): Shania Lynn
- Durée: 3 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you overwhelmed by the endless news of data breaches and cyber threats? Do you find yourself lost amidst technical jargon that sounds more like a script from a futuristic movie? Does the idea of defending your digital presence from invisible threats seem like an impossible task? Here's a bold truth: You don't need to be a tech whiz to master cybersecurity essentials. In fact, you're only one book away from transforming your digital life and securing your personal and professional information against the dark forces of the cyber world.
-
Cybersecurity Guard
- Unlocking the Secrets to Detect, Prevent, and Shield Your Devices from Cyber Threats and Scams
- Narrateur(s): Shania Lynn
- Durée: 3 h et 50 min
- Date de publication: 2024-08-26
- Langue: Anglais
-
Navigate the Digital Seas and Safeguard Your Online World in Just 7 Days, Even if Cybersecurity Sounds Like a Foreign Language to You.
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Cybersecurity for Beginners: 3 Books in 1
- What You Must Know About Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
- Auteur(s): Attila Kovacs
- Narrateur(s): Matyas J
- Durée: 5 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this audiobook you will learn: What types of roles exist in the field of Cybersecurity, what key concepts and methodologies you must learn in Cybersecurity, what are the key technologies that you should be aware, how to get started in the field of Cybersecurity, what kind of Cybersecurity entry level salary you can expect, how to overcome obstructions and get things done, how to become a project oriented security professional, what kind of mindset you must have in Cybersecurity, how to express your unique voice in Cybersecurity, and much more!
-
Cybersecurity for Beginners: 3 Books in 1
- What You Must Know About Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
- Narrateur(s): Matyas J
- Série: Cybersecurity for Beginners
- Durée: 5 h et 47 min
- Date de publication: 2020-04-10
- Langue: Anglais
-
In this audiobook you will learn: What types of roles exist in the field of Cybersecurity, what key concepts and methodologies you must learn in Cybersecurity, what are the key technologies that you should be aware, how to get started in the field of Cybersecurity....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Auteur(s): Prabath Siriwardena, Nuwan Dias
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications. Along the way, authors and software security experts Prabath Siriwardena and Nuwan Dias shine a light on important concepts like throttling, analytics gathering, access control at the API gateway, and microservice-to-microservice communication.
-
Microservices Security in Action
- Design Secure Network and API Endpoint Security for Microservices Applications, with Examples Using Java, Kubernetes, and Istio
- Narrateur(s): Aiden Humphreys
- Durée: 21 h
- Date de publication: 2021-03-17
- Langue: Anglais
-
Microservices Security in Action is filled with solutions, teaching best practices for throttling and monitoring, access control, and microservice-to-microservice communications....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53$ ou 1 crédit
Prix réduit: 37,53$ ou 1 crédit
-
-
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- Auteur(s): Bruce Brown
- Narrateur(s): Kim Pepper
- Durée: 11 h et 43 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application. Equip yourself with a dual weapon against cyber threats – a theoretical understanding and actionable strategies. Whether you're a cybersecurity novice or a seasoned expert, this 2-in-1 bundle is a must-have resource.
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- Narrateur(s): Kim Pepper
- Durée: 11 h et 43 min
- Date de publication: 2023-12-03
- Langue: Anglais
-
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26$ ou 1 crédit
Prix réduit: 31,26$ ou 1 crédit
-