Security Business
-
-
Cyber Security - 3 Book Combo
- Cyber Essentials - Cybersecurity for Small Business - Is Cyber Deterrence Possible?
- Auteur(s): Cybersecurity and Infrastructure Security Agency - FTC - US Department of Defense
- Narrateur(s): Tom Brooks
- Durée: 3 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As a leader, you need to drive your organization’s approach to cybersecurity as you would any other hazard (e.g. how you identify risk, reduce vulnerabilities, and plan for contingencies). This requires an investment of time and money, as well as the collective buy-in of your management team. Your investment drives actions and activities, and these build and sustain a culture of cybersecurity.
-
Cyber Security - 3 Book Combo
- Cyber Essentials - Cybersecurity for Small Business - Is Cyber Deterrence Possible?
- Narrateur(s): Tom Brooks
- Durée: 3 h et 16 min
- Date de publication: 2021-07-15
- Langue: Anglais
-
As a leader, you need to drive your organization’s approach to cybersecurity as you would any other hazard (e.g. how you identify risk, reduce vulnerabilities, and plan for contingencies). This requires an investment of time and money and the collective buy-in of your management team....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
Prisoners, Lovers, and Spies
- The Story of Invisible Ink from Herodotus to al-Qaeda
- Auteur(s): Kristie Macrakis
- Narrateur(s): Robert E. Prout
- Durée: 11 h et 30 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Kristie Macrakis combines a storyteller's sense of drama with a historian's respect for evidence in this pause-resisting history of intrigue and espionage, love and war, magic and secrecy. From the piazzas of ancient Rome to the spy capitals of the Cold War, Macrakis' global history reveals the drama and importance of invisible ink. From Ovid's advice to use milk for illicit love notes, to al-Qaeda's hidden instructions in pornographic movies, this book presents stories of secret messaging that chart its evolution in sophistication and its impact on history.
-
Prisoners, Lovers, and Spies
- The Story of Invisible Ink from Herodotus to al-Qaeda
- Narrateur(s): Robert E. Prout
- Durée: 11 h et 30 min
- Date de publication: 2015-06-22
- Langue: Anglais
- Kristie Macrakis combines a storyteller's sense of drama with a historian's respect for evidence in this history of intrigue and espionage, love and war, magic and secrecy....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 33,01 $
-
-
-
No Safe Harbor
- The Inside Truth About Cybercrime - and How to Protect Your Business
- Auteur(s): Mark Sangster
- Narrateur(s): Kevin Stillwell
- Durée: 5 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster tells listeners that cybersecurity is not an IT problem to solve - it is a business risk to manage.
-
No Safe Harbor
- The Inside Truth About Cybercrime - and How to Protect Your Business
- Narrateur(s): Kevin Stillwell
- Durée: 5 h et 27 min
- Date de publication: 2020-12-11
- Langue: Anglais
-
Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $
-
-
-
Facing Cyber Threats Head On
- Protecting Yourself and Your Business
- Auteur(s): Brian Minick
- Narrateur(s): Patrick Lawlor
- Durée: 5 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
News breaks all the time that hackers have attacked another company. Media outlets regularly cover cyber events. The President issues executive orders, and Congress explores cyber legislation. With all these events happening, business leaders must ask: what does this mean for my business and me?
-
Facing Cyber Threats Head On
- Protecting Yourself and Your Business
- Narrateur(s): Patrick Lawlor
- Durée: 5 h et 9 min
- Date de publication: 2017-01-16
- Langue: Anglais
- News breaks all the time that hackers have attacked another company....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,00 $
-
-
-
Cybersecurity Bundle: 4 Books in One
- The World of Cybersecurity - Cybersecurity for Small Business - Is Cyber Deterrence Possible? - Cybersecurity Career Path
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 4 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As the times have shifted in the last decade or so, we have started to depend more and more upon our computers as well as other electronic devices for our needs. The United States’ reliance on networked systems and the high costs associated with cyber attacks have led many leaders in the US government and the Department of Defense (DOD) to prioritize protecting our critical networked infrastructure. Part of that focus is trying to develop a strategy for deterring adversaries from attacking our networks in the first place.
-
Cybersecurity Bundle: 4 Books in One
- The World of Cybersecurity - Cybersecurity for Small Business - Is Cyber Deterrence Possible? - Cybersecurity Career Path
- Narrateur(s): Tom Brooks
- Durée: 4 h et 23 min
- Date de publication: 2021-06-09
- Langue: Anglais
-
As the times have shifted in the last decade or so, we have started to depend more and more upon our computers as well as other electronic devices for our needs. It's only natural for you to worry about your own safety when you know the extent of the dependency upon technology around you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
Security for Houses of Worship
- Second Edition
- Auteur(s): Michael A. Hodge
- Narrateur(s): Dave Wright
- Durée: 1 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Whether a church, mosque, or temple, religious facilities around the world are experiencing increased incidents of crime of every kind. Security for Houses of Worship is packed with best practices to prevent such crimes. The second edition has been enhanced to include a chapter on growing incidents of active shooters.
-
Security for Houses of Worship
- Second Edition
- Narrateur(s): Dave Wright
- Durée: 1 h et 53 min
- Date de publication: 2018-05-15
- Langue: Anglais
-
Religious facilities around the world are experiencing increased incidents of crime of every kind. Security for Houses of Worship is packed with best practices to prevent such crimes. The second edition has been enhanced to include a chapter on growing incidents of active shooters....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
The Audacity to Spy
- How Government, Business, and Hackers Rob Us of Privacy
- Auteur(s): Catherine Nolan, Ashley M. Wilson JD
- Narrateur(s): Randal Schaffer
- Durée: 4 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources.
-
The Audacity to Spy
- How Government, Business, and Hackers Rob Us of Privacy
- Narrateur(s): Randal Schaffer
- Durée: 4 h et 14 min
- Date de publication: 2016-08-11
- Langue: Anglais
- The Audacity to Spy reveals the ways in which your identity and personal data have been stolen by various sources....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,78 $
-
-
-
The Ideal Man
- The Tragedy of Jim Thompson and the American Way of War
- Auteur(s): Joshua Kurlantzick
- Narrateur(s): Josh Clark
- Durée: 8 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Jim Thompson landed in Thailand at the end of World War II, a former American society dilettante who became an Asian legend as a spy and silk magnate with access to Thai worlds outsiders never saw. As the Cold War reached Thailand, America had a choice: Should it, as Thompson believed, help other nations build democracies from their traditional cultures or, as his ex-OSS friend Willis Bird argued, remake the world through deception and self-serving alliances? This book explores a key Cold War epidsode.
-
The Ideal Man
- The Tragedy of Jim Thompson and the American Way of War
- Narrateur(s): Josh Clark
- Durée: 8 h et 16 min
- Date de publication: 2012-08-01
- Langue: Anglais
- How the West's greatest spy in Asia tried to stop the new American way of war - and the steep price he paid for failing....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 31,26 $
-
-
-
The Risk Business: Second Edition
- What Leaders Need to Know About Intelligence and Risk Based Security
- Auteur(s): Levi Gundert
- Narrateur(s): Levi Gundert
- Durée: 3 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In this book, Levi Gundert, chief security officer at Recorded Future, draws on his decades of experience to develop a comprehensive cybersecurity framework emphasizing risk over threats. The key is for the technical side of any organization to present intelligence to executives and other decision-makers in terms they understand: the language of risk. All operational outcomes must be framed in a clear, concrete way that tells a story of profit, loss, and risk reduction.
-
The Risk Business: Second Edition
- What Leaders Need to Know About Intelligence and Risk Based Security
- Narrateur(s): Levi Gundert
- Durée: 3 h et 44 min
- Date de publication: 2023-08-18
- Langue: Anglais
-
In this book, Levi Gundert, chief security officer at Recorded Future, draws on his decades of experience to develop a comprehensive cybersecurity framework emphasizing risk over threats....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
So, You Want to Get into Corporate Security?
- Auteur(s): Carlos Francisco
- Narrateur(s): Carlos Francisco
- Durée: 3 h et 58 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Although the global demand for physical security is growing, nuances of corporate security have become harder to navigate. From corporate standards and policies to emergency management, even those with extensive skills in the military or law enforcement may struggle to transition into the field. After years helping folks from the military, law enforcement, emergency services, and federal jobs move into corporate physical security, Carlos Francisco understands how to get you noticed, hired, and set up for success in your new career.
-
So, You Want to Get into Corporate Security?
- Narrateur(s): Carlos Francisco
- Durée: 3 h et 58 min
- Date de publication: 2022-02-08
- Langue: Anglais
-
Although the global demand for physical security is growing, nuances of corporate security have become harder to navigate....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
What Stays in Vegas
- The World of Personal Data - Lifeblood of Big Business - and the End of Privacy as We Know It
- Auteur(s): Adam Tanner
- Narrateur(s): John McLain
- Durée: 9 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers, and other firms are voraciously gathering data with little oversight from anyone. In Las Vegas, no company knows the value of data better than Caesars Entertainment. Many thousands of enthusiastic clients pour through the ever-open doors of their casinos. The secret to the company’s success lies in their one unrivaled asset: they know their clients intimately by tracking the activities of the overwhelming majority of gamblers.
-
What Stays in Vegas
- The World of Personal Data - Lifeblood of Big Business - and the End of Privacy as We Know It
- Narrateur(s): John McLain
- Durée: 9 h et 9 min
- Date de publication: 2014-09-02
- Langue: Anglais
- The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers, and other firms are voraciously gathering data with little oversight from anyone....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,34 $
-
-
-
Series 6 Exam AudioLearn
- Complete Audio Review for the Series 6 Securities License Exam
- Auteur(s): AudioLearn Content Team
- Narrateur(s): Adam Riley
- Durée: 5 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Developed by experienced professors and professionally narrated for easy listening, this course is a valuable tool when preparing for your Series 6 exam. The audio is focused and high-yield, covering the most important topics you need to know to succeed on the test. The material is accurate, up-to-date, and broken down into bite-sized chapters. There are quizzes and key takeaways sections following each chapter to review questions commonly tested and drive home key points.
-
Series 6 Exam AudioLearn
- Complete Audio Review for the Series 6 Securities License Exam
- Narrateur(s): Adam Riley
- Durée: 5 h et 29 min
- Date de publication: 2018-06-27
- Langue: Anglais
-
Developed by experienced professors and professionally narrated for easy listening, this course is a valuable tool when preparing for your Series 6 exam. The audio is focused and high-yield, covering the most important topics you need to know to succeed on the test....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00 $
-
-
-
Cyber Security, a Battle One Can’t Lose: Start Protecting Your Personal and Business Data
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 1 h et 27 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Are you scared of identity theft? Do you constantly fear that your personal data can get leaked? We need to have cybersecurity. Cybercrimes are increasing every day because of the exposure to the information related to our identity that is readily available on cloud services. This is a complete guide that will provide you with all the necessary information that you would want to know about cyber security. We should always remain alert so that we can avoid their occurrence completely.
-
Cyber Security, a Battle One Can’t Lose: Start Protecting Your Personal and Business Data
- Narrateur(s): Tom Brooks
- Durée: 1 h et 27 min
- Date de publication: 2021-09-15
- Langue: Anglais
-
Are you scared of identity theft? Do you constantly fear that your personal data can get leaked? We need to have cybersecurity. Cybercrimes are increasing every day because of the exposure to the information related to our identity that is readily available on cloud services....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
Industry of Anonymity
- Inside the Business of Cybercrime
- Auteur(s): Jonathan Lusthaus
- Narrateur(s): David Stifel
- Durée: 11 h et 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research in the world's technology-crime hot spots.
-
Industry of Anonymity
- Inside the Business of Cybercrime
- Narrateur(s): David Stifel
- Durée: 11 h et 47 min
- Date de publication: 2018-10-16
- Langue: Anglais
-
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research in the world's technology-crime hot spots....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 28,40 $
-
-
-
Critical Infrastructure Protection:
- Agencies Need to Assess Adoption of Cybersecurity Guidance - February 2022
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 3 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Federal agencies with a lead role to assist and protect one or more of the nation’s 16 critical infrastructures are referred to as sector risk management agencies (SRMAs). The SRMAs for three of the 16 have determined the extent of their sector’s adoption of the National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity (framework). In doing so, lead agencies took actions such as developing sector surveys and conducting technical assessments mapped to framework elements.
-
Critical Infrastructure Protection:
- Agencies Need to Assess Adoption of Cybersecurity Guidance - February 2022
- Narrateur(s): Tom Brooks
- Durée: 3 h et 6 min
- Date de publication: 2022-03-04
- Langue: Anglais
-
Federal agencies with a lead role to assist and protect one or more of the nation’s 16 critical infrastructures are referred to as sector risk management agencies (SRMAs)....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
The NFT 101 Beginners Guide
- Complete Investing Blueprint for Creating, Buying, Selling, and Trading Non-Fungible Tokens and Cryptocurrencies
- Auteur(s): Warren Steele
- Narrateur(s): Christopher Power
- Durée: 3 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Finding ways to make money that doesn’t force you to directly exchange your time for money is something we all dream of, but how many of us actually make it a reality? The problem is that it’s all too easy to look on with envy at the "lucky" few who make it work, while still doing nothing in your own life to force the shift.
-
The NFT 101 Beginners Guide
- Complete Investing Blueprint for Creating, Buying, Selling, and Trading Non-Fungible Tokens and Cryptocurrencies
- Narrateur(s): Christopher Power
- Durée: 3 h et 37 min
- Date de publication: 2022-11-01
- Langue: Anglais
-
Finding ways to make money that doesn’t force you to directly exchange your time for money is something we all dream of, but how many of us actually make it a reality? The problem is that it’s all too easy to look on with envy at the "lucky" few who make it work....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74 $
-
-
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Auteur(s): United States Government Accountability Office
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet. A global, multistakeholder community made up of many organizations shapes internet policy, operations, and security. But the ongoing and increasing reliance on the internet underscores the need to understand the risks to its underlying architecture.
-
Cybersecurity Internet Architecture Is Considered Resilient, but Federal Agencies Continue to Address Risks
- Report to the Committee on Armed Services, House of Representatives
- Narrateur(s): Tom Brooks
- Durée: 2 h et 34 min
- Date de publication: 2022-04-05
- Langue: Anglais
-
Why GAO did this study. The internet is a global system of interconnected networks used by billions of people across the world to perform personal, educational, commercial, and governmental tasks. The US Government over time has relinquished its oversight role of the internet....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
Cybersecurity Handbook for Small to Mid-Size Businesses
- Navigating the Cybersecurity Landscape with Confidence!
- Auteur(s): Oscar Fernandez
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
If you are like most business owners, you may feel overwhelmed (and sometimes intimidated) by the topic of cybersecurity. You're not alone! The good news is that help is here. The Cybersecurity Handbook for Small to Mid-Size Businesses is designed to demystify cybersecurity and data protection for you. It provides essential knowledge about these topics, as well as cost-effective solutions you can use to protect your business.
-
Cybersecurity Handbook for Small to Mid-Size Businesses
- Navigating the Cybersecurity Landscape with Confidence!
- Narrateur(s): Nathan Ashcroft
- Durée: 1 h
- Date de publication: 2023-08-11
- Langue: Anglais
-
If you are like most business owners, you may feel overwhelmed (and sometimes intimidated) by the topic of cybersecurity. You're not alone! The Cybersecurity Handbook for Small to Mid-Size Businesses is designed to demystify cybersecurity and data protection for you....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71 $
-
-
-
How to Implement Artificial Intelligence and Cybersecurity in Modern Businesses
- Basics and Guides for Dummies and Beginners
- Auteur(s): Perry S.
- Narrateur(s): Ben Herold
- Durée: 1 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This book is a good guide and provides basics on AI and cybersecurity to beginners and dummies. Also, it is helpful to answer questions of businesses like: How can one implement AI and cybersecurity in a company?, How and when can you link an AI?, and much more.
-
How to Implement Artificial Intelligence and Cybersecurity in Modern Businesses
- Basics and Guides for Dummies and Beginners
- Narrateur(s): Ben Herold
- Durée: 1 h et 25 min
- Date de publication: 2021-04-12
- Langue: Anglais
-
This book is a good guide and provides basics on AI and cybersecurity to beginners and dummies. Also, it is helpful to answer questions of businesses like: How can one implement AI and cybersecurity in a company?, How and when can you link an AI?, and much more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 6,05 $
-