Security Engineering
-
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- By: Tom Brooks
- Narrated by: Tom Brooks
- Length: 2 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity experts agree: No one security measure is foolproof to defend against attacks. Ransomware is a new threat. It comes from nowhere and can potentially lock you out of your data and applications until a ransom is paid, making it difficult to recover. These cybercriminals are extremely skilled and motivated. They want to access as much confidential personal information as possible. Security specialists recommend using every tool at your disposal, including draconian measures like backups, encrypting data files, redacting sensitive information on your devices and firewalls.
-
Cybersecurity Hackers Among Us
- Cybersecurity Tips Now More Than Ever Before, It's Essential to Keep Your Data Safe from Hackers
- Narrated by: Tom Brooks
- Length: 2 hrs and 6 mins
- Release date: 14-01-22
- Language: English
-
Cybersecurity is a silent war we cannot lose. What we face today is not a cyber war but a cyber battle. A battle that has been going on for the last couple of decades....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
Regular price: £6.99 or 1 Credit
Sale price: £6.99 or 1 Credit
-
-
-
A Gentle Introduction to Social Engineering Attack and Prevention
- By: Stephen Haunts
- Narrated by: Timothy Burke
- Length: 2 hrs and 42 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social engineering is one of the biggest threats to our organizations today. Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems. In this audiobook, we will look at some of the techniques used in social engineering and look at how to guard yourself against them.
-
A Gentle Introduction to Social Engineering Attack and Prevention
- Narrated by: Timothy Burke
- Length: 2 hrs and 42 mins
- Release date: 13-06-18
- Language: English
-
Social engineers use manipulation techniques to coerce people into revealing secrets about our companies to allow attackers to gain access to critical systems. In this audiobook, we will look at some of the techniques used in social engineering and how to guard yourself against them....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
Regular price: £6.99 or 1 Credit
Sale price: £6.99 or 1 Credit
-
-
-
Social Engineering
- Hiding in Plain Sight, InfoSec Series
- By: Patricia Arnold
- Narrated by: Rich Grimshaw
- Length: 1 hr and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hiding in Plain Sight will explain my research about this increasing element that allows groups of individuals to steal and often be provided with privileged, personal information. Yet somehow, we are not adequately aware. If we were, I wouldn't hear of devastating financial losses from individuals that are not usually easily fooled. Many refer to much of this fraudulent activity as identity theft, but I believe that there is more going on here than what can be seen on the surface.
-
Social Engineering
- Hiding in Plain Sight, InfoSec Series
- Narrated by: Rich Grimshaw
- Length: 1 hr and 25 mins
- Release date: 06-06-14
- Language: English
- Hiding in Plain Sight will explain my research about this increasing element that allows groups of individuals to steal and often be provided with privileged, personal information....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
Regular price: £6.99 or 1 Credit
Sale price: £6.99 or 1 Credit
-
-
-
Manage Your Own PC
- Be in Charge of Security
- By: Donovan Van Staden
- Narrated by: Grant Benker
- Length: 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
No previous PC management experience? No problem! No previous tech support experience? None needed! This book will empower you to take charge of your computer security. Start managing your own computer, using this book as your manual and guide. This book is written for non-technical computer owners. It avoids complex jargon and is to the point in identifying the crucial areas that every computer owner should focus on.
-
Manage Your Own PC
- Be in Charge of Security
- Narrated by: Grant Benker
- Series: Manage Your Own PC, Book 1
- Length: 47 mins
- Release date: 09-05-22
- Language: English
-
No previous PC management experience? No problem! No previous tech support experience? None needed! This book will empower you to take charge of your computer security. Start managing your own computer using this book as your manual and guide....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
Regular price: £3.99 or 1 Credit
Sale price: £3.99 or 1 Credit
-
-
-
IT Security Gumbo
- The Complete Vulnerability Lifecycle
- By: Corey Charles
- Narrated by: Marie C.
- Length: 1 hr and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
IT Security Gumbo: The Complete Vulnerability Lifecycle walks the listener through the entire vulnerability management life cycle and includes frameworks such as OWASP Top 10, .NET along with compliance and guidelines such as FIPS 199, HIPPA, NIST, FISMA and more. This book can not only serve as a guide for vulnerability management practitioners but it also can serve as a great reference for vendor certifications such as CISSP, CISA, CISM and Security+.
-
IT Security Gumbo
- The Complete Vulnerability Lifecycle
- Narrated by: Marie C.
- Length: 1 hr and 18 mins
- Release date: 11-09-20
- Language: English
-
IT Security Gumbo: The Complete Vulnerability Lifecycle walks the listener through the entire vulnerability management life cycle and includes frameworks such as OWASP Top 10, .NET along with compliance and guidelines such as FIPS 199, HIPPA, NIST, FISMA and more....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
Regular price: £6.99 or 1 Credit
Sale price: £6.99 or 1 Credit
-
-
-
Amazon Echo Dot Security: Amazon Echo Dot for Beginners. Amazon Echo Dot User Manual to Enrich Your Smart Life
- Amazon Echo and Amazon Echo Dot User Guide, Volume 1
- By: John Slavio
- Narrated by: Russell Archey
- Length: 1 hr and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you love the Amazon Echo but are worried about possible security flaws? Are you concerned about identity theft? Then check out this audiobook.
-
Amazon Echo Dot Security: Amazon Echo Dot for Beginners. Amazon Echo Dot User Manual to Enrich Your Smart Life
- Amazon Echo and Amazon Echo Dot User Guide, Volume 1
- Narrated by: Russell Archey
- Length: 1 hr and 6 mins
- Release date: 04-09-18
- Language: English
-
Do you love the Amazon Echo but are worried about possible security flaws? Are you concerned about identity theft? Then check out this audiobook....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
Regular price: £6.99 or 1 Credit
Sale price: £6.99 or 1 Credit
-
-
-
Hacking: Basic Security, Penetration Testing, and How to Hack
- By: Isaac Sharpe
- Narrated by: Martin James
- Length: 2 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever you're hacking.
-
-
The basics, for the beginner
- By Amazon Customer on 26-04-18
-
Hacking: Basic Security, Penetration Testing, and How to Hack
- Narrated by: Martin James
- Length: 2 hrs and 33 mins
- Release date: 17-09-15
- Language: English
- This easy guide will help transform and increase your hacking skill set....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
Regular price: £6.99 or 1 Credit
Sale price: £6.99 or 1 Credit
-
-
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- By: David Rauschendorfer
- Narrated by: Lauren Garvin
- Length: 1 hr and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every organization today faces an ever-changing set of threats in this digital landscape. Understanding how to develop a functional information security program to protect your organization’s reputation and brand from being tarnished due to a breach of your company’s sensitive information is more critical than ever. Developing a functional program that sets up the best information security practices across the organization’s operational workflows, is the leading practice for protecting against a possible breach.
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Narrated by: Lauren Garvin
- Length: 1 hr and 31 mins
- Release date: 12-11-21
- Language: English
-
Every organization today faces an ever-changing set of threats in this digital landscape....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
Regular price: £6.99 or 1 Credit
Sale price: £6.99 or 1 Credit
-
-
-
Hive Ransomware
- HHS Cybersecurity Program
- By: Office of Information Security
- Narrated by: Tom Brooks
- Length: 1 hr and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more.
-
Hive Ransomware
- HHS Cybersecurity Program
- Narrated by: Tom Brooks
- Length: 1 hr and 17 mins
- Release date: 11-11-21
- Language: English
-
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
Regular price: £6.99 or 1 Credit
Sale price: £6.99 or 1 Credit
-
-
-
Cybersecurity Career Paths and Progression
- By: Cybersecurity and Infrastructure Security Agency
- Narrated by: Tom Brooks
- Length: 1 hr and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license. Although there are exceptions to the rule, the general process includes completion of high school, earning a bachelor’s degree, entrance exams and completion of a master or doctoral program, on-the-job training (residencies and internships), and state or multi-state license examinations.
-
Cybersecurity Career Paths and Progression
- Narrated by: Tom Brooks
- Length: 1 hr and 19 mins
- Release date: 27-04-21
- Language: English
-
Pursuing a career in cybersecurity is not as straightforward as other more traditional professions. Doctors and lawyers serve as great examples. In most countries, including the United States, an advanced academic degree is required for each, along with an occupational license....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
Regular price: £6.99 or 1 Credit
Sale price: £6.99 or 1 Credit
-