Security Engineering
-
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Auteur(s): David Rauschendorfer
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every organization today faces an ever-changing set of threats in this digital landscape. Understanding how to develop a functional information security program to protect your organization’s reputation and brand from being tarnished due to a breach of your company’s sensitive information is more critical than ever. Developing a functional program that sets up the best information security practices across the organization’s operational workflows, is the leading practice for protecting against a possible breach.
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Date de publication: 2021-11-12
- Langue: Anglais
-
Every organization today faces an ever-changing set of threats in this digital landscape....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Green Real Deal
- American Energy, National Security, and a Better Plan for the Environment
- Auteur(s): Bill Herrington
- Narrateur(s): John Raynar
- Durée: 5 h et 4 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Russian invasion of Ukraine is a wake-up call: The all-in stance in favor of renewables has rendered Europe's economy and national security vulnerable to Russian President Vladimir Putin. And America is in danger of making the same catastrophic energy mistake as Europe. Award-winning author Bill Herrington delivers the truth about U.S. energy, national security, and the environment—and exposes the misrepresentations of fossil fuels protestors and climate change activists.
-
The Green Real Deal
- American Energy, National Security, and a Better Plan for the Environment
- Narrateur(s): John Raynar
- Durée: 5 h et 4 min
- Date de publication: 2023-10-05
- Langue: Anglais
-
The Russian invasion of Ukraine is a wake-up call: The all-in stance in favor of renewables has rendered Europe's economy and national security vulnerable to Russian President Vladimir Putin. And America is in danger of making the same catastrophic energy mistake as Europe....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Hacking: Basic Security, Penetration Testing, and How to Hack
- Auteur(s): Isaac Sharpe
- Narrateur(s): Martin James
- Durée: 2 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever you're hacking.
-
Hacking: Basic Security, Penetration Testing, and How to Hack
- Narrateur(s): Martin James
- Durée: 2 h et 33 min
- Date de publication: 2015-09-17
- Langue: Anglais
- This easy guide will help transform and increase your hacking skill set....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Auteur(s): Department of Justice FBI NSA Department of State
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Date de publication: 2023-06-21
- Langue: Anglais
-
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Auteur(s): Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cybersecurity experts agree: No one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls.
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Narrateur(s): Tom Brooks
- Durée: 2 h et 6 min
- Date de publication: 2022-01-14
- Langue: Anglais
-
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Black Snake
- Standing Rock, the Dakota Access Pipeline, and Environmental Justice
- Auteur(s): Katherine Wiltenburg Todrys
- Narrateur(s): Rainy Fields
- Durée: 8 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Black Snake is the story of four leaders - LaDonna Allard, Jasilyn Charger, Lisa DeVille, and Kandi White - and their fight against the pipeline. It is the story of a new generation of environmental activists, galvanized at Standing Rock, becoming the protectors of America's natural resources.
-
Black Snake
- Standing Rock, the Dakota Access Pipeline, and Environmental Justice
- Narrateur(s): Rainy Fields
- Durée: 8 h et 25 min
- Date de publication: 2021-07-06
- Langue: Anglais
-
Black Snake is the story of four leaders - LaDonna Allard, Jasilyn Charger, Lisa DeVille, and Kandi White - and their fight against the pipeline. It is the story of a new generation of environmental activists, galvanized at Standing Rock....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
Water
- Abundance, Scarcity, and Security in the Age of Humanity
- Auteur(s): Jeremy J. Schmidt
- Narrateur(s): Colleen Patrick
- Durée: 9 h et 44 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Humans take more than their geological share of water, but they do not benefit from it equally. This imbalance has created an era of intense water scarcity that affects the security of individuals, states, and the global economy. For many, this brazen water grab and the social inequalities it produces reflect the lack of a coherent philosophy connecting people to the planet. Challenging this view, Jeremy Schmidt shows how water was made a “resource” that linked geology, politics, and culture to American institutions.
-
Water
- Abundance, Scarcity, and Security in the Age of Humanity
- Narrateur(s): Colleen Patrick
- Durée: 9 h et 44 min
- Date de publication: 2017-10-03
- Langue: Anglais
- Humans take more than their geological share of water, but they do not benefit from it equally. This imbalance has created an era of intense water scarcity that affects the security of individuals....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 26,82$ ou 1 crédit
Prix réduit: 26,82$ ou 1 crédit
-
-
-
Cybersecurity
- What You Need to Know About Cybersecurity, Ethical Hacking, Risk Assessment, Social Engineering & How to Defend Yourself from Attacks
- Auteur(s): Ralph Voss
- Narrateur(s): James Powell
- Durée: 4 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber Security may sound like something very complex. However, this book takes a simple, easy to understand approach to breakdown complex topics so that you can understand better and take appropriate action to protect your information once you finish listening.
-
Cybersecurity
- What You Need to Know About Cybersecurity, Ethical Hacking, Risk Assessment, Social Engineering & How to Defend Yourself from Attacks
- Narrateur(s): James Powell
- Durée: 4 h et 12 min
- Date de publication: 2020-02-21
- Langue: Anglais
-
Cyber Security may sound like something very complex. However, this book takes a simple, easy to understand approach to breakdown complex topics so that you can understand better and take appropriate action to protect your information once you finish listening....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software used throughout government and critical infrastructure. Several policies and working groups at multiple levels within the U.S. Government focus on this need to ensure the authenticity, integrity, and trustworthiness of software products.
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Date de publication: 2024-01-11
- Langue: Anglais
-
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Insecurity of Everything
- How Hardware Data Security Became the Biggest Issue Facing the World Today
- Auteur(s): Aaron Blum, Kevin Dillon, Brendan Egan, Autres
- Narrateur(s): James Osborn
- Durée: 6 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Just 30 years ago, the average household only had a few electronics consisting of a television, landline phones, and appliances. Fast forward to today, and the average household has over four times this number, and it continues to grow by the day. This trend isn't just specific to households - it exists at companies, government entities, and virtually every organization and establishment around the world, including in developing countries. This has created a massive electronic waste issue, which is the largest growing stream of solid waste in the world.
-
The Insecurity of Everything
- How Hardware Data Security Became the Biggest Issue Facing the World Today
- Narrateur(s): James Osborn
- Durée: 6 h et 1 min
- Date de publication: 2021-10-07
- Langue: Anglais
-
Just 30 years ago, the average household only had a few electronics consisting of a television, landline phones, and appliances. Fast forward to today, and the average household has over four times this number, and it continues to grow by the day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Manage Your Own PC
- Be in Charge of Security
- Auteur(s): Donovan Van Staden
- Narrateur(s): Grant Benker
- Durée: 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
No previous PC management experience? No problem! No previous tech support experience? None needed! This book will empower you to take charge of your computer security. Start managing your own computer, using this book as your manual and guide. This book is written for non-technical computer owners. It avoids complex jargon and is to the point in identifying the crucial areas that every computer owner should focus on.
-
Manage Your Own PC
- Be in Charge of Security
- Narrateur(s): Grant Benker
- Série: Manage Your Own PC, Livre 1
- Durée: 47 min
- Date de publication: 2022-05-09
- Langue: Anglais
-
No previous PC management experience? No problem! No previous tech support experience? None needed! This book will empower you to take charge of your computer security. Start managing your own computer using this book as your manual and guide....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
Out of the Dark
- Paranormal Security and Intelligence Ops Shadow Agents: Part of the Immortal Ops World (Shadow Agents/PSI-Ops, Book 4)
- Auteur(s): Mandy M. Roth
- Narrateur(s): D. C. Cole
- Durée: 5 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Former Immortal Ops Agent Wheeler Summersbee has spent most of his life on the run from his own government. When he’d agreed to be a living test subject in their quest to genetically engineer the perfect super-soldiers, he never dreamed he’d come out the other side of the testing a gargoyle-vampire hybrid who craved blood and had a serious allergy to sunlight. So, when he finds himself trapped in what feels like eternal darkness, he abandons all hope. That is, until he hears the melodic voice of a mysterious woman. Could it be she’s his someone special?
-
Out of the Dark
- Paranormal Security and Intelligence Ops Shadow Agents: Part of the Immortal Ops World (Shadow Agents/PSI-Ops, Book 4)
- Narrateur(s): D. C. Cole
- Série: Shadow Agents Series, Livre 4
- Durée: 5 h et 19 min
- Date de publication: 2021-03-26
- Langue: Anglais
-
Former Immortal Ops Agent Wheeler Summersbee has spent most of his life on the run. When he’d agreed to be a living test subject in their quest to genetically engineer the perfect super-soldiers, he never dreamed he’d come out the other side of the testing a gargoyle-vampire....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Ransomware - 2 Books in One: What It Is and What to Do About It
- Cyber Security, a Battle One Can't Lose
- Auteur(s): National Investigative Joint Task Force and Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a type of malicious software, or malware, that encrypts data on a computer making it unusable. A malicious cyber criminal holds the data hostage until the ransom is paid. If the ransom is not paid, the victim's data remains unavailable. Cyber criminals may also pressure victims to pay the ransom by threatening to destroy the victim's data or to release it to the public. Without cyber-security, companies cannot defend themselves at the time of the breach. It is impossible to stop cyber-attacks from occurring by relying on antiviruses.
-
Ransomware - 2 Books in One: What It Is and What to Do About It
- Cyber Security, a Battle One Can't Lose
- Narrateur(s): Tom Brooks
- Durée: 2 h et 16 min
- Date de publication: 2021-09-15
- Langue: Anglais
-
Ransomware is a type of malicious software, or malware, that encrypts data on a computer making it unusable. A malicious cyber criminal holds the data hostage until the ransom is paid. If the ransom is not paid, the victim's data remains unavailable....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity Career Paths and Progression
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license. Although there are exceptions to the rule, the general process includes completion of high school, earning a bachelor’s degree, entrance exams and completion of a master or doctoral program, on-the-job training (residencies and internships), and state or multi-state license examinations.
-
Cybersecurity Career Paths and Progression
- Narrateur(s): Tom Brooks
- Durée: 1 h et 19 min
- Date de publication: 2021-04-27
- Langue: Anglais
-
Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
CISA Insights
- Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats Every Organization
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past year, cyber incidents have impacted many companies, nonprofits, and other organizations, large and small, across multiple sectors of the economy. The identification of destructive malware is particularly alarming given that similar malware has been deployed in the past - e.g., NotPetya and WannaCry ransomware - to cause significant, widespread damage to critical infrastructure.
-
CISA Insights
- Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats Every Organization
- Narrateur(s): Tom Brooks
- Durée: 1 h et 15 min
- Date de publication: 2022-01-31
- Langue: Anglais
-
Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past year, cyber incidents have impacted many companies, nonprofits, and other organizations, large and small....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Hive Ransomware
- HHS Cybersecurity Program
- Auteur(s): Office of Information Security
- Narrateur(s): Tom Brooks
- Durée: 1 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more.
-
Hive Ransomware
- HHS Cybersecurity Program
- Narrateur(s): Tom Brooks
- Durée: 1 h et 17 min
- Date de publication: 2021-11-11
- Langue: Anglais
-
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-