
Nouveau chez Audible ?
Top ventes
-
Mastering Zero Trust
- Strategy, Architecture & Execution: Design, Implementation, and Operations
- De : Arjun Mehta
- Lu par : Arjun Mehta, Jeremy Leigh
- Durée : 11 h et 36 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Mastering Zero Trust: Strategy, Architecture & Execution: Design, Implementation, and Operations" offers a comprehensive guide to understanding and implementing Zero Trust Security in modern networks.
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De : Andy Greenberg
- Lu par : Mark Bramhall
- Durée : 12 h et 2 min
- Version intégrale
-
Global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
In audible!
- Écrit par : Vincent le 08/01/2020
-
Hacke-moi si tu peux
- Mémoires d’un cyberpirate repenti
- De : Florent Curtet, Sophie Garcin
- Lu par : Cédric Dumond
- Durée : 4 h et 36 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Mémoires d'un cyberpirate repenti. Enfant génial et hyperactif, Florent voit dans l'ordinateur le complice d'une vie. Cette machine qui grandira en même temps que...
-
-
Un domaine de Hacker jadis inconnu
- Écrit par : jean pierre le 13/03/2024
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- De : Mike Chapple, James Michael Stewart, Darril Gibson
- Lu par : Tom Parks
- Durée : 65 h et 38 min
- Version intégrale
-
Global
-
Performance
-
Histoire
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
Data Analytics
- Practical Data Analysis and Statistical Guide to Transform and Evolve Any Business
- De : Isaac D. Cody
- Lu par : Kevin Theis
- Durée : 1 h et 10 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Having the proper analytics to further enhance your existing or new business is critical for pinpointing problems and achieving successes....
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- De : Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Lu par : Mike Lenz
- Durée : 8 h et 46 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
-
Mastering Zero Trust
- Strategy, Architecture & Execution: Design, Implementation, and Operations
- De : Arjun Mehta
- Lu par : Arjun Mehta, Jeremy Leigh
- Durée : 11 h et 36 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Mastering Zero Trust: Strategy, Architecture & Execution: Design, Implementation, and Operations" offers a comprehensive guide to understanding and implementing Zero Trust Security in modern networks.
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De : Andy Greenberg
- Lu par : Mark Bramhall
- Durée : 12 h et 2 min
- Version intégrale
-
Global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen....
-
-
In audible!
- Écrit par : Vincent le 08/01/2020
-
Hacke-moi si tu peux
- Mémoires d’un cyberpirate repenti
- De : Florent Curtet, Sophie Garcin
- Lu par : Cédric Dumond
- Durée : 4 h et 36 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Mémoires d'un cyberpirate repenti. Enfant génial et hyperactif, Florent voit dans l'ordinateur le complice d'une vie. Cette machine qui grandira en même temps que...
-
-
Un domaine de Hacker jadis inconnu
- Écrit par : jean pierre le 13/03/2024
-
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
- De : Mike Chapple, James Michael Stewart, Darril Gibson
- Lu par : Tom Parks
- Durée : 65 h et 38 min
- Version intégrale
-
Global
-
Performance
-
Histoire
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline....
-
Data Analytics
- Practical Data Analysis and Statistical Guide to Transform and Evolve Any Business
- De : Isaac D. Cody
- Lu par : Kevin Theis
- Durée : 1 h et 10 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Having the proper analytics to further enhance your existing or new business is critical for pinpointing problems and achieving successes....
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- De : Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Lu par : Mike Lenz
- Durée : 8 h et 46 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
-
Le plan d'action cybernétique
- De : Andre Edmond
- Lu par : Cole Mercer
- Durée : 5 h et 51 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Libérez votre potentiel : Faites le saut vers la cybersécurité avec confiance ! Vous êtes un professionnel de l'informatique ou un technicien du service d'assistance cherchant à entrer dans le domaine de la cybersécurité mais vous ne savez pas par où commencer ?
-
Broken Money
- Why Our Financial System Is Failing Us and How We Can Make It Better
- De : Lyn Alden
- Lu par : Guy Swann
- Durée : 17 h et 31 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Broken Money explores the history of money through the lens of technology. Politics can affect things temporarily and locally, but technology is what drives things forward globally and permanently....
-
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
- De : Omar Santos, Samer Salam, Hazim Dahir
- Lu par : Phil Schoen
- Durée : 9 h et 11 min
- Version intégrale
-
Global
-
Performance
-
Histoire
In this comprehensive guide, Cisco professionals engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow.
-
Hackers & Painters
- Big Ideas from the Computer Age
- De : Paul Graham
- Lu par : Mark Sando
- Durée : 7 h et 44 min
- Version intégrale
-
Global
-
Performance
-
Histoire
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care? Find out....
-
La cryptologie
- De : Jacques Stern
- Lu par : Jacques Stern
- Durée : 1 h et 23 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Des mathématiques à la révolution numérique, Jacques Stern, père de la cryptologie française moderne, présente ici son...
-
-
Aucune pédagogie à réserver aux initiés
- Écrit par : Matt le 28/08/2021
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De : Kim Zetter
- Lu par : Joe Ochman
- Durée : 13 h
- Version intégrale
-
Global
-
Performance
-
Histoire
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction....
-
-
Excellent!
- Écrit par : Nils le 14/02/2017
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- De : Recorded Future
- Lu par : Chris Pace
- Durée : 2 h et 37 min
- Version intégrale
-
Global
-
Performance
-
Histoire
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question....
-
Building a Career in Cybersecurity
- The Strategy and Skills You Need to Succeed
- De : Yuri Diogenes
- Lu par : Michael F. Walworth
- Durée : 4 h et 15 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Cybersecurity is one of the world’s fastest growing, most exciting fields—but that doesn’t mean it’s easy to enter the industry and succeed....
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- De : Glenn Greenwald
- Lu par : L. J. Ganser
- Durée : 9 h et 49 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state....
-
Cybersecurity Essentials
- De : Charles J. Brooks, Christopher Grow, Philip Craig, et autres
- Lu par : Ryan Burke
- Durée : 17 h et 27 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges....
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- De : Joseph Cox
- Lu par : Peter Ganim
- Durée : 11 h et 40 min
- Version intégrale
-
Global
-
Performance
-
Histoire
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De : Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Lu par : Ray Porter
- Durée : 9 h et 17 min
- Version intégrale
-
Global
-
Performance
-
Histoire
In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility"....
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De : Kevin Mitnick, William L. Simon
- Lu par : Ray Porter
- Durée : 13 h et 59 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Kevin Mitnick was the most elusive computer break-in artist in history....
-
Practical Fraud Prevention
- Fraud and AML Analytics for Fintech and eCommerce, Using SQL and Python
- De : Gilit Saporta, Shoshana Maraney
- Lu par : Kate Zane
- Durée : 14 h et 58 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Data scientists, data analysts, and fraud analysts will learn how to identify and quickly respond to attacks. You'll get a comprehensive view of typical incursions as well as recommended detection methods....
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- De : L.D. Knowings
- Lu par : KC Wayman
- Durée : 3 h et 20 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets.
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- De : Eric Conrad, Seth Misenar, Joshua Feldman
- Lu par : Matthew E. Kelly
- Durée : 10 h et 4 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Eleventh Hour CISSP: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information....
-
ISO 9001:2015
- A Pocket Guide
- De : Steve Watkins, Nick Orchiston
- Lu par : Andy Cresswell
- Durée : 1 h et 11 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Currently used by more than 1.1 million organizations worldwide, the international standard ISO 9001:2015 is the world’s most established quality framework. This is a handy reference audiobook that provides an overview of the ISO 9001 quality management standard....
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- De : Peter Aiken, Todd Harbour
- Lu par : Susan Hanfield
- Durée : 9 h et 43 min
- Version intégrale
-
Global
-
Performance
-
Histoire
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance....
-
The Book of Satoshi
- The Collected Writings of Bitcoin Creator Satoshi Nakamoto, 1st Edition
- De : Phil Champagne
- Lu par : Stephanie Murphy
- Durée : 7 h et 27 min
- Version intégrale
-
Global
-
Performance
-
Histoire
The book of Satoshi, the collected writings of Satoshi Nakamoto....
-
A Hacker's Mind
- How the Powerful Bend Society's Rules, and How to Bend Them Back
- De : Bruce Schneier
- Lu par : Dan John Miller
- Durée : 8 h et 3 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world....
-
The Wires of War
- Technology and the Global Struggle for Power
- De : Jacob Helberg
- Lu par : Jesse Einstein
- Durée : 11 h et 32 min
- Version intégrale
-
Global
-
Performance
-
Histoire
From 2016 to 2020, Jacob Helberg led Google’s global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war....
-
Certified Information Security Manager CISM Study Guide
- De : Mike Chapple PhD CISM
- Lu par : Daniel Henning
- Durée : 19 h et 21 min
- Version intégrale
-
Global
-
Performance
-
Histoire
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide....
-
-
You have to buy the printed version if you want to get the documents, tables and matrix that are discussed 🤬
- Écrit par : Florian le 06/12/2023
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- De : Mike Chapple, David Seidl
- Lu par : Ray Greenley
- Durée : 24 h et 52 min
- Version intégrale
-
Global
-
Performance
-
Histoire
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam.
Le genre littéraire jeunesse
Bref historique du genre
Les auteurs internationaux et français de jeunesse les plus populaires
- J.K. Rowling, auteur de la série “Harry Potter“
- Rick Riordan, auteur de la série “Percy Jackson“
- Roald Dahl, auteur de “Charlie et la chocolaterie“
- En France, on peut citer Timothée de Fombelle, Marie-Aude Murail et Jean-Claude Mourlevat.
Les sous-genres les plus populaires
- La littérature d'aventure
- La science-fiction
- La fantaisie
- La romance
- Le réalisme