Security Engineering
-
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software used throughout government and critical infrastructure. Several policies and working groups at multiple levels within the U.S. Government focus on this need to ensure the authenticity, integrity, and trustworthiness of software products.
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Narrateur(s): Tom Brooks
- Durée: 2 h et 12 min
- Date de publication: 2024-01-11
- Langue: Anglais
-
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Out of the Dark
- Paranormal Security and Intelligence Ops Shadow Agents: Part of the Immortal Ops World (Shadow Agents/PSI-Ops, Book 4)
- Auteur(s): Mandy M. Roth
- Narrateur(s): D. C. Cole
- Durée: 5 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Former Immortal Ops Agent Wheeler Summersbee has spent most of his life on the run from his own government. When he’d agreed to be a living test subject in their quest to genetically engineer the perfect super-soldiers, he never dreamed he’d come out the other side of the testing a gargoyle-vampire hybrid who craved blood and had a serious allergy to sunlight. So, when he finds himself trapped in what feels like eternal darkness, he abandons all hope. That is, until he hears the melodic voice of a mysterious woman. Could it be she’s his someone special?
-
Out of the Dark
- Paranormal Security and Intelligence Ops Shadow Agents: Part of the Immortal Ops World (Shadow Agents/PSI-Ops, Book 4)
- Narrateur(s): D. C. Cole
- Série: Shadow Agents Series, Livre 4
- Durée: 5 h et 19 min
- Date de publication: 2021-03-26
- Langue: Anglais
-
Former Immortal Ops Agent Wheeler Summersbee has spent most of his life on the run. When he’d agreed to be a living test subject in their quest to genetically engineer the perfect super-soldiers, he never dreamed he’d come out the other side of the testing a gargoyle-vampire....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Ransomware - 2 Books in One: What It Is and What to Do About It
- Cyber Security, a Battle One Can't Lose
- Auteur(s): National Investigative Joint Task Force and Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 2 h et 16 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a type of malicious software, or malware, that encrypts data on a computer making it unusable. A malicious cyber criminal holds the data hostage until the ransom is paid. If the ransom is not paid, the victim's data remains unavailable. Cyber criminals may also pressure victims to pay the ransom by threatening to destroy the victim's data or to release it to the public. Without cyber-security, companies cannot defend themselves at the time of the breach. It is impossible to stop cyber-attacks from occurring by relying on antiviruses.
-
Ransomware - 2 Books in One: What It Is and What to Do About It
- Cyber Security, a Battle One Can't Lose
- Narrateur(s): Tom Brooks
- Durée: 2 h et 16 min
- Date de publication: 2021-09-15
- Langue: Anglais
-
Ransomware is a type of malicious software, or malware, that encrypts data on a computer making it unusable. A malicious cyber criminal holds the data hostage until the ransom is paid. If the ransom is not paid, the victim's data remains unavailable....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Auteur(s): Department of Justice FBI NSA Department of State
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
-
Joint Cybersecurity Advisory
- North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
- Narrateur(s): Tom Brooks
- Durée: 2 h et 5 min
- Date de publication: 2023-06-21
- Langue: Anglais
-
The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Network Infrastructure Security Guidance
- National Security Agency Cybersecurity Technical Report
- Auteur(s): National Security Agency
- Narrateur(s): Tom Brooks
- Durée: 3 h et 38 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Guidance for securing networks continues to evolve as new vulnerabilities are exploited by adversaries, new security features are implemented, and new methods of securing devices are identified. All networks are at risk of compromise, especially if devices are not properly configured and maintained. This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network.
-
Network Infrastructure Security Guidance
- National Security Agency Cybersecurity Technical Report
- Narrateur(s): Tom Brooks
- Durée: 3 h et 38 min
- Date de publication: 2022-03-21
- Langue: Anglais
-
All networks are at risk of compromise, especially if devices are not properly configured and maintained. This report presents best practices for overall network security and protection of individual network devices....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Social Engineering
- Hiding in Plain Sight, InfoSec Series
- Auteur(s): Patricia Arnold
- Narrateur(s): Rich Grimshaw
- Durée: 1 h et 25 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Hiding in Plain Sight will explain my research about this increasing element that allows groups of individuals to steal and often be provided with privileged, personal information. Yet somehow, we are not adequately aware. If we were, I wouldn't hear of devastating financial losses from individuals that are not usually easily fooled. Many refer to much of this fraudulent activity as identity theft, but I believe that there is more going on here than what can be seen on the surface.
-
-
A reading of Social Engineering and Hacker terms.
- Écrit par Scott le 2017-12-05
-
Social Engineering
- Hiding in Plain Sight, InfoSec Series
- Narrateur(s): Rich Grimshaw
- Durée: 1 h et 25 min
- Date de publication: 2014-06-06
- Langue: Anglais
- Hiding in Plain Sight will explain my research about this increasing element that allows groups of individuals to steal and often be provided with privileged, personal information....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
A Gentle Introduction to Social Engineering Attack and Prevention
- Auteur(s): Stephen Haunts
- Narrateur(s): Timothy Burke
- Durée: 2 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Social engineering is one of the biggest threats to our organizations today. Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems. In this audiobook, we will look at some of the techniques used in social engineering and look at how to guard yourself against them.
-
A Gentle Introduction to Social Engineering Attack and Prevention
- Narrateur(s): Timothy Burke
- Durée: 2 h et 42 min
- Date de publication: 2018-06-13
- Langue: Anglais
-
Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems. In this audiobook, we will look at some of the techniques used in social engineering and how to guard yourself against them....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
CISA Insights
- Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats Every Organization
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 15 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past year, cyber incidents have impacted many companies, nonprofits, and other organizations, large and small, across multiple sectors of the economy. The identification of destructive malware is particularly alarming given that similar malware has been deployed in the past - e.g., NotPetya and WannaCry ransomware - to cause significant, widespread damage to critical infrastructure.
-
CISA Insights
- Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats Every Organization
- Narrateur(s): Tom Brooks
- Durée: 1 h et 15 min
- Date de publication: 2022-01-31
- Langue: Anglais
-
Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past year, cyber incidents have impacted many companies, nonprofits, and other organizations, large and small....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Hive Ransomware
- HHS Cybersecurity Program
- Auteur(s): Office of Information Security
- Narrateur(s): Tom Brooks
- Durée: 1 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more.
-
Hive Ransomware
- HHS Cybersecurity Program
- Narrateur(s): Tom Brooks
- Durée: 1 h et 17 min
- Date de publication: 2021-11-11
- Langue: Anglais
-
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Manage Your Own PC
- Be in Charge of Security
- Auteur(s): Donovan Van Staden
- Narrateur(s): Grant Benker
- Durée: 47 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
No previous PC management experience? No problem! No previous tech support experience? None needed! This book will empower you to take charge of your computer security. Start managing your own computer, using this book as your manual and guide. This book is written for non-technical computer owners. It avoids complex jargon and is to the point in identifying the crucial areas that every computer owner should focus on.
-
Manage Your Own PC
- Be in Charge of Security
- Narrateur(s): Grant Benker
- Série: Manage Your Own PC, Livre 1
- Durée: 47 min
- Date de publication: 2022-05-09
- Langue: Anglais
-
No previous PC management experience? No problem! No previous tech support experience? None needed! This book will empower you to take charge of your computer security. Start managing your own computer using this book as your manual and guide....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Auteur(s): David Rauschendorfer
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every organization today faces an ever-changing set of threats in this digital landscape. Understanding how to develop a functional information security program to protect your organization’s reputation and brand from being tarnished due to a breach of your company’s sensitive information is more critical than ever. Developing a functional program that sets up the best information security practices across the organization’s operational workflows, is the leading practice for protecting against a possible breach.
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Date de publication: 2021-11-12
- Langue: Anglais
-
Every organization today faces an ever-changing set of threats in this digital landscape....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Hacking: Basic Security, Penetration Testing, and How to Hack
- Auteur(s): Isaac Sharpe
- Narrateur(s): Martin James
- Durée: 2 h et 33 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever you're hacking.
-
Hacking: Basic Security, Penetration Testing, and How to Hack
- Narrateur(s): Martin James
- Durée: 2 h et 33 min
- Date de publication: 2015-09-17
- Langue: Anglais
- This easy guide will help transform and increase your hacking skill set....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 9,20$ ou 1 crédit
Prix réduit: 9,20$ ou 1 crédit
-
-
-
Amazon Echo Dot Security: Amazon Echo Dot for Beginners. Amazon Echo Dot User Manual to Enrich Your Smart Life
- Amazon Echo and Amazon Echo Dot User Guide, Volume 1
- Auteur(s): John Slavio
- Narrateur(s): Russell Archey
- Durée: 1 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Do you love the Amazon Echo but are worried about possible security flaws? Are you concerned about identity theft? Then check out this audiobook.
-
Amazon Echo Dot Security: Amazon Echo Dot for Beginners. Amazon Echo Dot User Manual to Enrich Your Smart Life
- Amazon Echo and Amazon Echo Dot User Guide, Volume 1
- Narrateur(s): Russell Archey
- Durée: 1 h et 6 min
- Date de publication: 2018-09-04
- Langue: Anglais
-
Do you love the Amazon Echo but are worried about possible security flaws? Are you concerned about identity theft? Then check out this audiobook....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
IT Security Gumbo
- The Complete Vulnerability Lifecycle
- Auteur(s): Corey Charles
- Narrateur(s): Marie C.
- Durée: 1 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
IT Security Gumbo: The Complete Vulnerability Lifecycle walks the listener through the entire vulnerability management life cycle and includes frameworks such as OWASP Top 10, .NET along with compliance and guidelines such as FIPS 199, HIPPA, NIST, FISMA and more. This book can not only serve as a guide for vulnerability management practitioners but it also can serve as a great reference for vendor certifications such as CISSP, CISA, CISM and Security+.
-
IT Security Gumbo
- The Complete Vulnerability Lifecycle
- Narrateur(s): Marie C.
- Durée: 1 h et 18 min
- Date de publication: 2020-09-11
- Langue: Anglais
-
IT Security Gumbo: The Complete Vulnerability Lifecycle walks the listener through the entire vulnerability management life cycle and includes frameworks such as OWASP Top 10, .NET along with compliance and guidelines such as FIPS 199, HIPPA, NIST, FISMA and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Cybersecurity Career Paths and Progression
- Auteur(s): Cybersecurity and Infrastructure Security Agency
- Narrateur(s): Tom Brooks
- Durée: 1 h et 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license. Although there are exceptions to the rule, the general process includes completion of high school, earning a bachelor’s degree, entrance exams and completion of a master or doctoral program, on-the-job training (residencies and internships), and state or multi-state license examinations.
-
Cybersecurity Career Paths and Progression
- Narrateur(s): Tom Brooks
- Durée: 1 h et 19 min
- Date de publication: 2021-04-27
- Langue: Anglais
-
Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Senior Dummies' Guide to the Top 5 Android Security Tips: How to Feel and Stay Safe While Using Android Phones and Tablets
- Senior Dummies Guides, Volume 2
- Auteur(s): Kevin Brandt
- Narrateur(s): Kevin Brandt
- Durée: 19 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Seniors! This short book is big on impact! In this book you will find the top five security tips for using your Android device. With easy to follow steps, you will find tips like these: How to... #1: Security screen locking… #5: App permission advice…
-
The Senior Dummies' Guide to the Top 5 Android Security Tips: How to Feel and Stay Safe While Using Android Phones and Tablets
- Senior Dummies Guides, Volume 2
- Narrateur(s): Kevin Brandt
- Durée: 19 min
- Date de publication: 2019-04-16
- Langue: Anglais
-
Seniors! This short book is big on impact! In this book you will find the top five security tips for using your Android device....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-