Security Engineering
-
-
CISA Open Source Software Security Roadmap
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
As a public good, open-source software is supported by diverse and wide-ranging communities—which are composed of individual maintainers, non-profit software foundations, and corporate stewards. CISA must integrate into and support these communities, with a particular focus on the critical OSS components that the federal government and critical infrastructure systems rely upon.
-
CISA Open Source Software Security Roadmap
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2023-09-26
- Langue: Anglais
-
This roadmap lays out how CISA will help enable the secure usage and development of OSS, both within and outside the federal government....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
A Gentle Introduction to Social Engineering Attack and Prevention
- Auteur(s): Stephen Haunts
- Narrateur(s): Timothy Burke
- Durée: 2 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Social engineering is one of the biggest threats to our organizations today. Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems. In this audiobook, we will look at some of the techniques used in social engineering and look at how to guard yourself against them.
-
A Gentle Introduction to Social Engineering Attack and Prevention
- Narrateur(s): Timothy Burke
- Durée: 2 h et 42 min
- Date de publication: 2018-06-13
- Langue: Anglais
-
Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems. In this audiobook, we will look at some of the techniques used in social engineering and how to guard yourself against them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
IT Security Gumbo
- The Complete Vulnerability Lifecycle
- Auteur(s): Corey Charles
- Narrateur(s): Marie C.
- Durée: 1 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
IT Security Gumbo: The Complete Vulnerability Lifecycle walks the listener through the entire vulnerability management life cycle and includes frameworks such as OWASP Top 10, .NET along with compliance and guidelines such as FIPS 199, HIPPA, NIST, FISMA and more. This book can not only serve as a guide for vulnerability management practitioners but it also can serve as a great reference for vendor certifications such as CISSP, CISA, CISM and Security+.
-
IT Security Gumbo
- The Complete Vulnerability Lifecycle
- Narrateur(s): Marie C.
- Durée: 1 h et 18 min
- Date de publication: 2020-09-11
- Langue: Anglais
-
IT Security Gumbo: The Complete Vulnerability Lifecycle walks the listener through the entire vulnerability management life cycle and includes frameworks such as OWASP Top 10, .NET along with compliance and guidelines such as FIPS 199, HIPPA, NIST, FISMA and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Amazon Echo Dot Security: Amazon Echo Dot for Beginners. Amazon Echo Dot User Manual to Enrich Your Smart Life
- Amazon Echo and Amazon Echo Dot User Guide, Volume 1
- Auteur(s): John Slavio
- Narrateur(s): Russell Archey
- Durée: 1 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you love the Amazon Echo but are worried about possible security flaws? Are you concerned about identity theft? Then check out this audiobook.
-
Amazon Echo Dot Security: Amazon Echo Dot for Beginners. Amazon Echo Dot User Manual to Enrich Your Smart Life
- Amazon Echo and Amazon Echo Dot User Guide, Volume 1
- Narrateur(s): Russell Archey
- Durée: 1 h et 6 min
- Date de publication: 2018-09-04
- Langue: Anglais
-
Do you love the Amazon Echo but are worried about possible security flaws? Are you concerned about identity theft? Then check out this audiobook....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Common Sense for the 21st Century
- Only Nonviolent Rebellion Can Now Stop Climate Breakdown and Social Collapse
- Auteur(s): Roger Hallam
- Narrateur(s): Tim Bruce
- Durée: 2 h et 53 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
An urgent, essential, and practical call to action from the co-founder of Extinction Rebellion. The climate crisis threatens global social collapse. Within a generation. What to do? Common Sense for the 21st Century outlines how movements around the world now need to come together to start doing "what works". This means engaging in mass civil disobedience to make real change happen. This booklet is not just theory, it is the call to action. The political class is not going to save us from extinction.
-
Common Sense for the 21st Century
- Only Nonviolent Rebellion Can Now Stop Climate Breakdown and Social Collapse
- Narrateur(s): Tim Bruce
- Durée: 2 h et 53 min
- Date de publication: 2019-11-27
- Langue: Anglais
-
An urgent, essential, and practical call to action from the co-founder of Extinction Rebellion. The climate crisis threatens global social collapse. Within a generation. What to do? Listen to find out more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
15,10 $ ou gratuit avec l'essai de 30 jours
-
-
-
Ransomware - 2 Books in One: What It Is and What to Do About It
- Cyber Security, a Battle One Can't Lose
- Auteur(s): National Investigative Joint Task Force and Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a type of malicious software, or malware, that encrypts data on a computer making it unusable. A malicious cyber criminal holds the data hostage until the ransom is paid. If the ransom is not paid, the victim's data remains unavailable. Cyber criminals may also pressure victims to pay the ransom by threatening to destroy the victim's data or to release it to the public. Without cyber-security, companies cannot defend themselves at the time of the breach. It is impossible to stop cyber-attacks from occurring by relying on antiviruses.
-
Ransomware - 2 Books in One: What It Is and What to Do About It
- Cyber Security, a Battle One Can't Lose
- Narrateur(s): Tom Brooks
- Durée: 2 h et 16 min
- Date de publication: 2021-09-15
- Langue: Anglais
-
Ransomware is a type of malicious software, or malware, that encrypts data on a computer making it unusable. A malicious cyber criminal holds the data hostage until the ransom is paid. If the ransom is not paid, the victim's data remains unavailable....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Auteur(s): Hans Weber
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how can you safeguard yourself from the different threats? Let’s find out. We will also take a look at the career of a computer networking specialist and the challenges you can expect.
-
Computer Systems and Networking Guide
- A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
- Narrateur(s): Jim D. Johnston
- Durée: 1 h et 49 min
- Date de publication: 2020-06-12
- Langue: Anglais
-
Handling computers has gotten easier than before. However, do you know the world of the internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how to safeguard yourself from the different threats? Find out....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking: Basic Security, Penetration Testing, and How to Hack
- Auteur(s): Isaac Sharpe
- Narrateur(s): Martin James
- Durée: 2 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever you're hacking.
-
Hacking: Basic Security, Penetration Testing, and How to Hack
- Narrateur(s): Martin James
- Durée: 2 h et 33 min
- Date de publication: 2015-09-17
- Langue: Anglais
- This easy guide will help transform and increase your hacking skill set....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hacking for Beginners
- A Step by Step Guide to Learn the Concept of Ethical Hacking. How to Use the Essential Command Line, Penetration Testing and Basic Security for Your First Hack.
- Auteur(s): Norman Laurence
- Narrateur(s): Cole Niblett
- Durée: 3 h et 54 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you find the art of computer hacking interesting to you? Do you want to become a hacker? Are you ready to get the real business of becoming an expert hacker? Well, you now have what you need to kick-start your journey of a stellar hacking career. This audiobook, Hacking for Beginners, guides you in an easy-to-understand, step-by-step procedure that’s ideal for a beginner who is intent on acquiring basic hacking skills. The audiobook is well-researched, neatly arranged, and ideally targeted at new learners.
-
Hacking for Beginners
- A Step by Step Guide to Learn the Concept of Ethical Hacking. How to Use the Essential Command Line, Penetration Testing and Basic Security for Your First Hack.
- Narrateur(s): Cole Niblett
- Durée: 3 h et 54 min
- Date de publication: 2020-09-29
- Langue: Anglais
-
Do you find the art of computer hacking interesting to you? Do you want to become a hacker? Are you ready to get the real business of becoming an expert hacker? Well, you now have what you need to kick-start your journey of a stellar hacking career....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
The Senior Dummies' Guide to the Top 5 Android Security Tips: How to Feel and Stay Safe While Using Android Phones and Tablets
- Senior Dummies Guides, Volume 2
- Auteur(s): Kevin Brandt
- Narrateur(s): Kevin Brandt
- Durée: 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Seniors! This short book is big on impact! In this book you will find the top five security tips for using your Android device. With easy to follow steps, you will find tips like these: How to... #1: Security screen locking… #5: App permission advice…
-
The Senior Dummies' Guide to the Top 5 Android Security Tips: How to Feel and Stay Safe While Using Android Phones and Tablets
- Senior Dummies Guides, Volume 2
- Narrateur(s): Kevin Brandt
- Durée: 19 min
- Date de publication: 2019-04-16
- Langue: Anglais
-
Seniors! This short book is big on impact! In this book you will find the top five security tips for using your Android device....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
4,95 $ ou gratuit avec l'essai de 30 jours
-
-
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software used throughout government and critical infrastructure. Several policies and working groups at multiple levels within the U.S. Government focus on this need to ensure the authenticity, integrity, and trustworthiness of software products.
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Date de publication: 2024-01-11
- Langue: Anglais
-
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Incident & Vulnerability Response Playbooks
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 23 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Cybersecurity and Infrastructure Security Agency (CISA) is committed to leading the response to cybersecurity incidents and vulnerabilities to safeguard the nation's critical assets. Section 6 of Executive Order 14028 directed DHS, via CISA, to “develop a standard set of operational procedures (playbook) to be used in planning and conducting cybersecurity vulnerability and incident response activity respecting Federal Civilian Executive Branch (FCEB) Information Systems.
-
Cybersecurity Incident & Vulnerability Response Playbooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 23 min
- Date de publication: 2021-12-01
- Langue: Anglais
-
These playbooks provide FCEB agencies with a standard set of procedures to identify, coordinate, remediate, recover, and track successful mitigations from incidents and vulnerabilities affecting FCEB systems, data, and networks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
CISA Insights
- Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats Every Organization
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past year, cyber incidents have impacted many companies, nonprofits, and other organizations, large and small, across multiple sectors of the economy. The identification of destructive malware is particularly alarming given that similar malware has been deployed in the past - e.g., NotPetya and WannaCry ransomware - to cause significant, widespread damage to critical infrastructure.
-
CISA Insights
- Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats Every Organization
- Narrateur(s): Tom Brooks
- Durée: 1 h et 15 min
- Date de publication: 2022-01-31
- Langue: Anglais
-
Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past year, cyber incidents have impacted many companies, nonprofits, and other organizations, large and small....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Hive Ransomware
- HHS Cybersecurity Program
- Auteur(s): Office of Information Security
- Narrateur(s): Tom Brooks
- Durée: 1 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more.
-
Hive Ransomware
- HHS Cybersecurity Program
- Narrateur(s): Tom Brooks
- Durée: 1 h et 17 min
- Date de publication: 2021-11-11
- Langue: Anglais
-
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-
-
-
Identity and Access Management
- Recommended Best Practices for Administrators
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Identity and access management (IAM) is a framework of business processes, policies, and technologies that facilitate the management of digital identities to ensure that users only gain access to data when they have the appropriate credentials.
-
-
This book in NOT for IAM professionals and will have little use for someone living outside of USA.
- Écrit par Utilisateur anonyme le 2024-10-04
-
Identity and Access Management
- Recommended Best Practices for Administrators
- Narrateur(s): Tom Brooks
- Durée: 3 h et 4 min
- Date de publication: 2023-04-04
- Langue: Anglais
-
Identity and access management (IAM) is a framework of business processes, policies, and technologies that facilitate the management of digital identities to ensure that users only gain access to data when they have the appropriate credentials....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
18,74 $ ou gratuit avec l'essai de 30 jours
-
-
-
Cybersecurity Career Paths and Progression
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license. Although there are exceptions to the rule, the general process includes completion of high school, earning a bachelor’s degree, entrance exams and completion of a master or doctoral program, on-the-job training (residencies and internships), and state or multi-state license examinations.
-
Cybersecurity Career Paths and Progression
- Narrateur(s): Tom Brooks
- Durée: 1 h et 19 min
- Date de publication: 2021-04-27
- Langue: Anglais
-
Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
8,71 $ ou gratuit avec l'essai de 30 jours
-