Cărți audio Securitate
Cărți audio populare
Titluri Securitate discutate și apreciate intens în această lună.
Blockchain Basics: A Non-Technical Introduction in 25 Steps Evaluare: 5 din 5 stele5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Evaluare: 5 din 5 stele5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Evaluare: 5 din 5 stele5/5Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications Evaluare: 0 din 5 stele0 evaluăriCybersecurity For Dummies Evaluare: 4 din 5 stele4/5The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Evaluare: 4 din 5 stele4/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Evaluare: 4 din 5 stele4/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Evaluare: 5 din 5 stele5/5Blockchain and the Law: The Rule of Code Evaluare: 4 din 5 stele4/5Threats: What Every Engineer Should Learn From Star Wars Evaluare: 5 din 5 stele5/5Blockchain For Dummies Evaluare: 5 din 5 stele5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Evaluare: 4 din 5 stele4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Evaluare: 5 din 5 stele5/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Evaluare: 4 din 5 stele4/5Cybercrime Investigators Handbook Evaluare: 0 din 5 stele0 evaluăriInvestigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Evaluare: 5 din 5 stele5/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Evaluare: 5 din 5 stele5/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Evaluare: 4 din 5 stele4/5Practical Fraud Prevention: Fraud and AML Analytics for Fintech and eCommerce, Using SQL and Python Evaluare: 0 din 5 stele0 evaluăriThe Digital Silk Road: China's Quest to Wire the World and Win the Future Evaluare: 5 din 5 stele5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Evaluare: 4 din 5 stele4/5The Art of Attack: Attacker Mindset for Security Professionals Evaluare: 5 din 5 stele5/5How I Rob Banks: And Other Such Places Evaluare: 4 din 5 stele4/5Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know Evaluare: 4 din 5 stele4/5Cybersecurity: The Insights You Need from Harvard Business Review Evaluare: 5 din 5 stele5/5Cybersecurity Program Development for Business: The Essential Planning Guide Evaluare: 5 din 5 stele5/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Evaluare: 4 din 5 stele4/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Evaluare: 5 din 5 stele5/5The Smartest Person in the Room Evaluare: 5 din 5 stele5/5If It's Smart, It's Vulnerable Evaluare: 4 din 5 stele4/5
Explorează mai mult
Treceți la altă categorie și descoperiți ce se potrivește stării dvs.:
Nu mai aveți nimic de descoperit în Securitate
Descoperiți lumea cărților audio și bucurați-vă de noi aventuri.
Summary of Bruce Sterling's The Hacker Crackdown Law and Disorder on the Electronic Frontier Evaluare: 0 din 5 stele0 evaluăriOWASP Top 10 Vulnerabilities: Beginner's Guide To Web Application Security Risks Evaluare: 0 din 5 stele0 evaluăriCybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Evaluare: 0 din 5 stele0 evaluăriThe Smartest Person in the Room Evaluare: 5 din 5 stele5/5Pentesting 101: Cracking Gadgets And Hacking Software Evaluare: 0 din 5 stele0 evaluăriEthical Hacking for Beginners: Comprehensive Introduction to the World of Cybersecurity Evaluare: 0 din 5 stele0 evaluăriOSINT 101 Handbook: Expert-Level Intelligence Gathering: Advanced Reconnaissance, Threat Assessment, And Counterintelligence Evaluare: 0 din 5 stele0 evaluăriThreats: What Every Engineer Should Learn From Star Wars Evaluare: 5 din 5 stele5/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Evaluare: 4 din 5 stele4/5HACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 3 BOOKS IN 1 Evaluare: 0 din 5 stele0 evaluăriCybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity Evaluare: 0 din 5 stele0 evaluăriTor Darknet Bundle (5 in 1): Master the Art of Invisibility Evaluare: 5 din 5 stele5/5Summary of Andy Greenberg's Sandworm Evaluare: 4 din 5 stele4/5The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Evaluare: 0 din 5 stele0 evaluăriReconnaissance 101: Footprinting & Information Gathering: Ethical Hackers Bible To Collect Data About Target Systems Evaluare: 0 din 5 stele0 evaluăriBuilding a Cyber Risk Management Program: Evolving Security for the Digital Age Evaluare: 0 din 5 stele0 evaluăriTrojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Evaluare: 0 din 5 stele0 evaluăriBEYOND BITCOIN INVESTING: Why other cryptocurrencies are so important and easy to make digital cash now Evaluare: 0 din 5 stele0 evaluăriKali Linux CLI Boss: Novice To Command Line Maestro Evaluare: 0 din 5 stele0 evaluăriThe Tao of Open Source Intelligence Evaluare: 0 din 5 stele0 evaluăriHacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Evaluare: 0 din 5 stele0 evaluăriHACKING: Hacking Firewalls & Bypassing Honeypots Evaluare: 5 din 5 stele5/5Cyber Wargaming: Research and Education for Security in a Dangerous Digital World Evaluare: 0 din 5 stele0 evaluăriBlockchain: Everything You Need to Know About Blockchain Evaluare: 5 din 5 stele5/5HOW TO IMPLEMENT ARTIFICIAL INTELLIGENCE AND CYBERSECURITY IN MODERN BUSINESSES: BASICS AND GUIDES FOR DUMMIES AND BEGINNERS Evaluare: 0 din 5 stele0 evaluăriBitcoin For Beginners: Bitcoin, Bitcoin Mining, Cryptography And The Cypherpunk Movement | 2 Books In 1 Evaluare: 0 din 5 stele0 evaluăriKey Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World Evaluare: 0 din 5 stele0 evaluăriThe Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Evaluare: 0 din 5 stele0 evaluăriEthical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 Evaluare: 0 din 5 stele0 evaluăriCybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Evaluare: 0 din 5 stele0 evaluăriRed Team Operations: Attack: Black Box Hacking, Social Engineering & Web App Scanning Evaluare: 5 din 5 stele5/5ISO 27001 Controls – A guide to implementing and auditing Evaluare: 0 din 5 stele0 evaluăriTor and the Dark Art of Anonymity Evaluare: 5 din 5 stele5/5Computer Science 2.0 Beginners Crash Course - Python, Javascript, Cyber Security And Algorithms Evaluare: 0 din 5 stele0 evaluăriAdvanced OSINT Strategies: Online Investigations And Intelligence Gathering Evaluare: 0 din 5 stele0 evaluări(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Evaluare: 5 din 5 stele5/5NIST Cybersecurity Framework: A pocket guide Evaluare: 0 din 5 stele0 evaluăriISO/IEC 27001:2022: An introduction to information security and the ISMS standard Evaluare: 5 din 5 stele5/5Cryptography And Computer Science: Design Manual For Algorithms, Codes And Ciphers Evaluare: 0 din 5 stele0 evaluăriDigital Earth: Cyber threats, privacy and ethics in an age of paranoia Evaluare: 0 din 5 stele0 evaluăriNIST Cloud Security: Cyber Threats, Policies, And Best Practices Evaluare: 5 din 5 stele5/5Darknet: A Beginner's Guide to Staying Anonymous Online Evaluare: 5 din 5 stele5/5Governance of Enterprise IT based on COBIT 5: A Management Guide Evaluare: 0 din 5 stele0 evaluăriIf It's Smart, It's Vulnerable Evaluare: 4 din 5 stele4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Evaluare: 5 din 5 stele5/5The Wires of War: Technology and the Global Struggle for Power Evaluare: 4 din 5 stele4/5Mind Hacking for Self-Mastery Evaluare: 5 din 5 stele5/5(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Evaluare: 0 din 5 stele0 evaluăriCompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Evaluare: 5 din 5 stele5/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Evaluare: 4 din 5 stele4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Evaluare: 4 din 5 stele4/5The DevSecOps Playbook: Deliver Continuous Security at Speed Evaluare: 0 din 5 stele0 evaluăriBitcoin para iniciantes e inexperientes: Criptomoedas e Blockchain Evaluare: 5 din 5 stele5/5Burners and Black Markets: How to Be Invisible on Android, Blackberry & Iphone Evaluare: 5 din 5 stele5/5Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications Evaluare: 0 din 5 stele0 evaluăriWireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark Evaluare: 0 din 5 stele0 evaluăriHacking for Beginners Evaluare: 5 din 5 stele5/5You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Evaluare: 0 din 5 stele0 evaluăriBlockchain Basics: A Non-Technical Introduction in 25 Steps Evaluare: 5 din 5 stele5/5Malware Reverse Engineering: Cracking The Code Evaluare: 0 din 5 stele0 evaluăriSocial Engineering: The Science of Human Hacking 2nd Edition Evaluare: 5 din 5 stele5/5Blockchain for Kids, Teens, Adults, and Dummies: Introduction to Crypto Investing and Blockchain Technology in Simple Words Evaluare: 0 din 5 stele0 evaluăriPractical Fraud Prevention: Fraud and AML Analytics for Fintech and eCommerce, Using SQL and Python Evaluare: 0 din 5 stele0 evaluări8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Evaluare: 4 din 5 stele4/5The Missing Training Manual Evaluare: 0 din 5 stele0 evaluăriA Vulnerable System: The History of Information Security in the Computer Age Evaluare: 5 din 5 stele5/5Blockchain: The Insights You Need from Harvard Business Review Evaluare: 4 din 5 stele4/5Cybersecurity Handbook for Small to Mid-size Businesses Evaluare: 0 din 5 stele0 evaluăriSchneier on Security Evaluare: 4 din 5 stele4/5Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Evaluare: 0 din 5 stele0 evaluăriHacking the Hacker: Learn From the Experts Who Take Down Hackers Evaluare: 4 din 5 stele4/5The CISO Evolution: Business Knowledge for Cybersecurity Executives Evaluare: 5 din 5 stele5/5Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response Evaluare: 0 din 5 stele0 evaluăriUnmasking the Social Engineer: The Human Element of Security Evaluare: 5 din 5 stele5/5Certified Information Security Manager CISM Study Guide Evaluare: 0 din 5 stele0 evaluăriHackers & Painters: Big Ideas from the Computer Age Evaluare: 4 din 5 stele4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Evaluare: 4 din 5 stele4/5Minar Criptomonedas Paso a Paso: Guía Completa Para Ganar Dinero con la Minería de Bitcoin y de Altcoins Evaluare: 0 din 5 stele0 evaluăriHow I Rob Banks: And Other Such Places Evaluare: 4 din 5 stele4/5The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Evaluare: 4 din 5 stele4/5Cloud Security For Dummies Evaluare: 5 din 5 stele5/5The Real Business of Blockchain: How Leaders Can Create Value in a New Digital Age Evaluare: 5 din 5 stele5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Evaluare: 5 din 5 stele5/5Blockchain For Dummies Evaluare: 5 din 5 stele5/5Cybersecurity All-in-One For Dummies Evaluare: 0 din 5 stele0 evaluăriCompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Evaluare: 5 din 5 stele5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Evaluare: 4 din 5 stele4/5Social Engineering: The Art of Human Hacking Evaluare: 5 din 5 stele5/5Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Evaluare: 5 din 5 stele5/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Evaluare: 4 din 5 stele4/5Alice and Bob Learn Application Security Evaluare: 5 din 5 stele5/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Evaluare: 4 din 5 stele4/5LA IA Curso de Inteligencia Artificial De Principiante a Experto: LA IA Curso de Inteligencia Artificial De Principiante a Experto Evaluare: 0 din 5 stele0 evaluăriEthical Hacking Evaluare: 0 din 5 stele0 evaluăriCybersecurity: The Insights You Need from Harvard Business Review Evaluare: 5 din 5 stele5/5The Art of Attack: Attacker Mindset for Security Professionals Evaluare: 5 din 5 stele5/5Cybercrime Investigators Handbook Evaluare: 0 din 5 stele0 evaluăriThe Pentester BluePrint: Starting a Career as an Ethical Hacker Evaluare: 5 din 5 stele5/5Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know Evaluare: 4 din 5 stele4/5HACKING: How to Hack Web Apps Evaluare: 5 din 5 stele5/5Aprende a Invertir en Criptomonedas: 17 Trucos Para Hacer Dinero Online Desde Casa Evaluare: 0 din 5 stele0 evaluăriCrypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Evaluare: 4 din 5 stele4/5Summary of Kevin D. Mitnick & William L. Simon’s The Art of Deception Evaluare: 0 din 5 stele0 evaluăriAI Cybersecurity: Guardians of the Net Evaluare: 0 din 5 stele0 evaluăriThe Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Evaluare: 4 din 5 stele4/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Evaluare: 5 din 5 stele5/5El Libro Negro de Ethereum: Secretos Revelados: Desde la Inversión y Programación hasta el Futuro de la Web 3.0 Evaluare: 0 din 5 stele0 evaluăriLiars and Outliers: Enabling the Trust that Society Needs to Thrive Evaluare: 4 din 5 stele4/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Evaluare: 5 din 5 stele5/5Blue Team Operations: Defense: Operational Security, Incident Response & Digital Forensics Evaluare: 0 din 5 stele0 evaluăriCryptography: The Key to Digital Security, How It Works, and Why It Matters Evaluare: 5 din 5 stele5/5Ransomware Protection Playbook Evaluare: 5 din 5 stele5/5Zero Day: Novice No More: Expose Software Vulnerabilities And Eliminate Bugs Evaluare: 0 din 5 stele0 evaluăriCybersecurity Program Development for Business: The Essential Planning Guide Evaluare: 5 din 5 stele5/5The Enigma Story: The Truth Behind the 'Unbreakable' World War II Cipher Evaluare: 0 din 5 stele0 evaluăriA Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Evaluare: 0 din 5 stele0 evaluăriLinux for Beginners: 37 Linux Commands you Must Know Evaluare: 4 din 5 stele4/5Cyber War: The Next Threat to National Security and What to Do About It Evaluare: 3 din 5 stele3/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Evaluare: 5 din 5 stele5/5The Digital Silk Road: China's Quest to Wire the World and Win the Future Evaluare: 5 din 5 stele5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Evaluare: 4 din 5 stele4/5Michael Saylor's Bitcoin MicroStrategy Evaluare: 0 din 5 stele0 evaluăriBug Hunting 101: Novice To Virtuoso: Web Application Security For Ethical Hackers Evaluare: 0 din 5 stele0 evaluăriCryptography: A Very Short Introduction Evaluare: 5 din 5 stele5/5The Art of Deception: Controlling the Human Element of Security Evaluare: 4 din 5 stele4/5Bitcoin & Cryptocurrency Technologies (3 Books in 1): Bitcoin Invest in Digital Gold, Wallet Technology Book and Anonymous Altcoins Evaluare: 0 din 5 stele0 evaluăriOSINT Commando: Penetrating Networks With Spokeo, Spiderfoot, Seon, And Lampyre Evaluare: 0 din 5 stele0 evaluăriEl Libro Negro de Bitcoin: Todo lo que tu Banco y tu Gobierno no Quieren que Sepas sobre la Blockchain y las Criptomonedas Evaluare: 0 din 5 stele0 evaluăriCyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers Evaluare: 0 din 5 stele0 evaluăriSummary of Ellen Notbohm's Ten Things Every Child with Autism Wishes You Knew Evaluare: 0 din 5 stele0 evaluăriCloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Evaluare: 4 din 5 stele4/5(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Evaluare: 5 din 5 stele5/5Breached!: Why Data Security Law Fails and How to Improve It: 1st Edition Evaluare: 5 din 5 stele5/5How to Build a Cyber-Resilient Organization Evaluare: 0 din 5 stele0 evaluăriSocial Engineering for Beginners: Manipulating Minds, Securing Systems Evaluare: 0 din 5 stele0 evaluăriCómo protegerte del phishing. Evita que te roben tu información y tu dinero Evaluare: 5 din 5 stele5/5Security Awareness For Dummies Evaluare: 5 din 5 stele5/5Gray Hat: Vulnerability Scanning & Penetration Testing Evaluare: 0 din 5 stele0 evaluăriBitcoin and Cryptocurrency: 2 Books in 1, Discover the secrets to the Blockchain and get ready for the 2020 Bull Run! Evaluare: 0 din 5 stele0 evaluăriEthereum: Everything You Need to Know About Ethereum Evaluare: 0 din 5 stele0 evaluăriCybersecurity For Dummies Evaluare: 4 din 5 stele4/5Hack Your Way to Security Bundle, 2 in 1 Bundle Evaluare: 0 din 5 stele0 evaluăriBlockchain and the Law: The Rule of Code Evaluare: 4 din 5 stele4/5The Cyber Conundrum: How Do We Fix Cybersecurity? Evaluare: 4 din 5 stele4/5Bitcoin: 2 Manuscripts: Blockchain, Cryptocurrency Evaluare: 0 din 5 stele0 evaluăriCybersecurity Fundamentals Explained Evaluare: 0 din 5 stele0 evaluăriThe Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Evaluare: 0 din 5 stele0 evaluăriThe Basics of Hacking Evaluare: 5 din 5 stele5/5Bitcoin And Blockchain For Beginners: Bitcoin, Bitcoin Mining And Blockchain Basics | 2 Books In 1 Evaluare: 0 din 5 stele0 evaluăriOSINT Cracking Tools: Maltego, Shodan, Aircrack-NG, Recon-NG Evaluare: 0 din 5 stele0 evaluăriEthical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics | 2 Books In 1 Evaluare: 0 din 5 stele0 evaluăriBlockchain: The New Internet? How You Can Benefit from Blockchain Technology Beyond Bitcoin, Cryptocurrency, and Ethereum Evaluare: 0 din 5 stele0 evaluăriDefense In Depth: Network Security And Cyber Resilience Evaluare: 0 din 5 stele0 evaluăriGuardians of Secrecy: Your Expert Guide to Protecting Your Confidential Information Evaluare: 0 din 5 stele0 evaluăriThe Secret Life: Three True Stories of the Digital Age Evaluare: 3 din 5 stele3/5Nine Steps to Success: An ISO27001:2013 Implementation Overview Evaluare: 0 din 5 stele0 evaluăriMetasploit Masterclass For Ethical Hackers: Expert Penetration Testing And Vulnerability Assessment Evaluare: 0 din 5 stele0 evaluăriBitcoin: Everything You Need to Know About Bitcoin Evaluare: 0 din 5 stele0 evaluăriOSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith Evaluare: 0 din 5 stele0 evaluăriBitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Evaluare: 4 din 5 stele4/5Bitcoin: Invest In Digital Gold Evaluare: 0 din 5 stele0 evaluăriCryptocurrency: Everything You Need to Know About Cryptocurrency Evaluare: 0 din 5 stele0 evaluăriSummary of Andy Greenberg's Sandworm Evaluare: 0 din 5 stele0 evaluăriDie Kunst der Anonymität im Internet: So schützen Sie Ihre Identität und Ihre Daten Evaluare: 0 din 5 stele0 evaluăriRethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Evaluare: 0 din 5 stele0 evaluăriMetaverse for Beginners: The Ultimate Guide to Understanding and Investing in Web 3.0, NFTs, Crypto Gaming, and Virtual Reality Evaluare: 0 din 5 stele0 evaluăriCyberwatch 101: The Art Of Cyber Defense And Infrastructure Security Evaluare: 0 din 5 stele0 evaluăriThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Evaluare: 0 din 5 stele0 evaluăriThrough the Firewall: The Alchemy of Turning Crisis into Opportunity Evaluare: 5 din 5 stele5/5Hacking Wireless With Kali Linux: Learn Fast How To Penetrate Any Wireless Network | 2 Books In 1 Evaluare: 0 din 5 stele0 evaluăriZero Trust Security: Building Cyber Resilience & Robust Security Postures Evaluare: 0 din 5 stele0 evaluăriCyber Security: Essential principles to secure your organisation Evaluare: 5 din 5 stele5/5Data For the People: How to Make Our Post-Privacy Economy Work for You Evaluare: 3 din 5 stele3/5Cyber Warfare in 2022+ Evaluare: 0 din 5 stele0 evaluăriFighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Evaluare: 0 din 5 stele0 evaluăriCryptocurrency: 3 Manuscripts: Blockchain, Cryptocurrency, Bitcoin Evaluare: 3 din 5 stele3/5Your Short Guide to Security Systems: What You Need to Know Before Purchasing a Security System to Protect Your Family and Assets Evaluare: 0 din 5 stele0 evaluăriHow To Protect Your Personal Computer: Your Step By Step Guide To Protecting Your Personal Computer Evaluare: 0 din 5 stele0 evaluări¡Que no te espíen! Las herramientas y aplicaciones imprescindibles para proteger tu privacidad en la red Evaluare: 0 din 5 stele0 evaluăriNMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library Evaluare: 0 din 5 stele0 evaluăriFight Off Hackers Evaluare: 5 din 5 stele5/5The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Evaluare: 0 din 5 stele0 evaluăriMetaverse and NFT: Discovering Web 3.0, Investing in Non-fungible Tokens, Virtual Reality, Crypto Gaming, and Art Evaluare: 0 din 5 stele0 evaluăriISO27001/ISO27002:2013: A Pocket Guide Evaluare: 0 din 5 stele0 evaluăriNFT: What Malevich Didn't Know Evaluare: 0 din 5 stele0 evaluăriGuarding Against Online Identity Fraud: A Simple Guide to Online Security Evaluare: 0 din 5 stele0 evaluăriSichere Verbindung ins Netzwerk, VPN Evaluare: 0 din 5 stele0 evaluăriGet in the Game: How to Level Up Your Business with Gaming, Esports, and Emerging Technologies Evaluare: 0 din 5 stele0 evaluăriThe Art of Cyber Security: A practical guide to winning the war on cyber crime Evaluare: 0 din 5 stele0 evaluăriBlockchain for Everyone - A Guide for Absolute Newbies: The Technology and the Cyber-Economy That Have Already Changed Our Future Evaluare: 0 din 5 stele0 evaluăriGuíaBurros: Ciberseguridad: Consejos para tener vidas digitales más seguras Evaluare: 5 din 5 stele5/5Burp Suite: Novice To Ninja: Pen Testing Cloud, Network, Mobile & Web Applications Evaluare: 0 din 5 stele0 evaluăriSee Yourself in Cyber: Security Careers Beyond Hacking Evaluare: 0 din 5 stele0 evaluăriThe Security Consultant's Handbook Evaluare: 0 din 5 stele0 evaluăriNFT for Beginners: An Essential Guide to Understanding and Investing in Non-fungible Tokens and Crypto Art Evaluare: 0 din 5 stele0 evaluăriThe Cybersecurity Maturity Model Certification (CMMC) – A pocket guide Evaluare: 0 din 5 stele0 evaluăriSecurity in the Digital World Evaluare: 0 din 5 stele0 evaluăriHow Cyber Security Can Protect Your Business: A guide for all stakeholders Evaluare: 0 din 5 stele0 evaluăriRisk Management and ISO 31000: A pocket guide Evaluare: 0 din 5 stele0 evaluăriYour Data, Their Billions: Unraveling and Simplifying Big Tech Evaluare: 4 din 5 stele4/5Cyber Resilience: Defence-in-depth principles Evaluare: 0 din 5 stele0 evaluăriIT-Sicherheit: TOM's, Cybercrime, Awareness Evaluare: 0 din 5 stele0 evaluări
Citiți ce vreți și cum vreți
Descoperiți milioane de cărți electronice, cărți audio și multe altele cu o perioadă de probă gratuită.
Doar $11.99/lună după perioada de probă. Anulați oricând.