Computer Encryption
-
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- By: Alsden Keir
- Narrated by: Darren Guido
- Length: 1 hr and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends. Communicating through screens has become so common that most of us don’t even think twice before opening a message, clicking a link, or responding to a notification. But in that sea of normal communication lies something much more dangerous: messages designed to trick you, to make you give away your passwords, financial details, or other private information. These scams often come hidden in the very tools we trust most—email and text.
-
-
Essential Knowledge for the Digital Age
- By Libby Matthews on 31-05-25
-
Hidden in Plain Sight
- 10 Subtle Clues That Text or Email Is a Phishing Scam
- Narrated by: Darren Guido
- Length: 1 hr and 20 mins
- Release date: 27-05-25
- Language: English
-
Every day, we send and receive countless messages—emails from work, reminders from banks, shipping updates from online stores, and texts from friends.
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£6.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Hacking ISIS
- How to Destroy the Cyber Jihad
- By: Malcolm Nance, Christopher Sampson
- Narrated by: Neil Shah
- Length: 7 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
This book is written by two of the leading terrorist experts in the world. Hacking ISIS will explain in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world. More, the book will map out the cyberspace-level tactics on how ISIS spreads its terrifying content, how it distributes tens of thousands of pieces of propaganda daily and is winning the battle in cyberspace and how to stop it in its tracks.
-
Hacking ISIS
- How to Destroy the Cyber Jihad
- Narrated by: Neil Shah
- Length: 7 hrs and 47 mins
- Release date: 09-07-18
- Language: English
-
Hacking ISIS will explain in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£18.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- By: Jake T. Mills
- Narrated by: Tom Brooks
- Length: 5 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies. Each question is accompanied by detailed explanations and insights into the reasoning behind the correct answers, helping you grasp the underlying concepts thoroughly.
-
-
Interesting and excellent book
- By Sarah Pickett on 16-05-24
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- Narrated by: Tom Brooks
- Length: 5 hrs and 1 min
- Release date: 13-12-23
- Language: English
-
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£14.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Cyber Essentials
- A Pocket Guide
- By: Alan Calder
- Narrated by: Liam Gerrard
- Length: 1 hr and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
Every year, thousands of computer systems in the UK are compromised. The majority fall victim to easily preventable cyberattacks, carried out with tools that are freely available on the Internet. Cyber Essentials is the UK government's reaction to the proliferation of these attacks. It requires that organizations put basic security measures in place, enabling them to reliably counter the most common tactics employed by cybercriminals. This guide explains how to achieve certification to Cyber Essentials in a fast, effective, and cost-effective manner.
-
Cyber Essentials
- A Pocket Guide
- Narrated by: Liam Gerrard
- Length: 1 hr and 13 mins
- Release date: 04-12-18
- Language: English
-
This guide explains how to achieve certification to Cyber Essentials in a fast, effective, and cost-effective manner....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£6.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Coding Democracy
- How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
- By: Maureen Webb, Cory Doctorow - foreword
- Narrated by: Wendy Tremont King
- Length: 16 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In Coding Democracy, Maureen Webb offers another view. Hackers, she argues, can be vital disruptors. Hacking is becoming a practice, an ethos, and a metaphor for a new wave of activism in which ordinary citizens are inventing new forms of distributed, decentralized democracy for a digital era. Confronted with concentrations of power, mass surveillance, and authoritarianism enabled by new technology, the hacking movement is trying to "build out" democracy into cyberspace.
-
-
very good
- By julien on 08-01-24
-
Coding Democracy
- How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
- Narrated by: Wendy Tremont King
- Length: 16 hrs and 35 mins
- Release date: 09-03-21
- Language: English
-
Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£16.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- By: Ram Shankar Siva Kumar, Hyrum Anderson, Bruce Schneier - foreword
- Narrated by: Shawn K. Jain
- Length: 7 hrs
- Unabridged
-
Overall
-
Performance
-
Story
In Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What to Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour—from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria—recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes.
-
Not with a Bug, but with a Sticker
- Attacks on Machine Learning Systems and What to Do About Them
- Narrated by: Shawn K. Jain
- Length: 7 hrs
- Release date: 21-11-23
- Language: English
-
A team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£12.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- By: Recorded Future
- Narrated by: Chris Pace
- Length: 2 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
-
Excellent
- By C. Clarke on 28-06-20
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- Narrated by: Chris Pace
- Length: 2 hrs and 37 mins
- Release date: 15-01-19
- Language: English
-
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£6.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- By: Sean D. Mack
- Narrated by: William Sarris
- Length: 7 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The DevSecOps Playbook: Deliver Continuous Security at Speed, the chief information and information security officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You'll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You'll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks.
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- Narrated by: William Sarris
- Length: 7 hrs and 9 mins
- Release date: 21-11-23
- Language: English
-
An essential and up-to-date guide to DevSecOps....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£12.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- By: Peter Aiken, Todd Harbour
- Narrated by: Susan Hanfield
- Length: 9 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance. Our Digital Civics Framework presents a guide to increasing the data literacy of billions of citizens. We outline the data knowledge that society needs and propose exercises that will help citizens interact productively within a data-driven society.
-
Data Literacy
- Achieving Higher Productivity for Citizens, Knowledge Workers, and Organizations
- Narrated by: Susan Hanfield
- Length: 9 hrs and 43 mins
- Release date: 16-05-22
- Language: English
-
A PIDD is a Perpetual Involuntary Data Donor. Surveillance capitalists love PIDDs because PIDDs materially support the data extraction industry by unwittingly surrendering their personal information, paying for data transport and storage, and tolerating poor technology performance....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£14.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Hacked Again
- By: Scott N. Schober
- Narrated by: John Pruden
- Length: 3 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.
-
Hacked Again
- Narrated by: John Pruden
- Length: 3 hrs and 38 mins
- Release date: 18-02-16
- Language: English
- Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£11.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- By: Lester Evans
- Narrated by: Michael Reaves
- Length: 3 hrs and 25 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention.... Do you create tons of accounts you will never again visit? Does your password contain a sequence of numbers, such as “123456”? Do you automatically click all links and download all email attachments coming from your friends? This audiobook will show you just how incredibly lucky you are that nobody's hacked you before.
-
-
A big rant about corporations
- By Jockum Svanberg on 23-04-20
-
Cybersecurity
- An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- Narrated by: Michael Reaves
- Length: 3 hrs and 25 mins
- Release date: 10-01-19
- Language: English
-
If you want to avoid getting hacked, having your information spread, and risking financial loss, then pay attention.... Do you create tons of accounts you will never again visit? Does your password contain a sequence of numbers, such as “123456”? Find out more....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£11.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- By: Dana Onyshko
- Narrated by: Gary Westphalen, Jon Bratton
- Length: 5 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management. Do you feel that cyber security is indispensable in todays digital-dependent world? Do you want to introduce yourself to the world of cyber security but are easily overwhelmed or not sure where to start? Are you concerned about your own digital devices and networks, do you suspect they may be hacked or reporting information about your daily habits to unknown databases?
-
Cyber Security Beginners Guide
- Cyber Security, Online Threats and How to Defend Your Digital Assets
- Narrated by: Gary Westphalen, Jon Bratton
- Length: 5 hrs and 40 mins
- Release date: 19-04-24
- Language: English
-
Cyber Security Beginners Guide. Technology is constantly changing fast and it wont stop, we know this; however, now machine learning and automation are huge game-changers for security and threat management.
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£14.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- By: Lester Evans
- Narrated by: Brian R. Scott
- Length: 3 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? You’re not alone. Half-baked products and services that chip away at your sense of ownership, independence and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers.
-
-
Weird
- By J on 13-03-19
-
Ethical Hacking
- The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
- Narrated by: Brian R. Scott
- Length: 3 hrs and 35 mins
- Release date: 05-02-19
- Language: English
-
Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Find out more....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£11.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- By: Kip Boyle
- Narrated by: Kip A. Boyle
- Length: 5 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.
-
-
solid brief of CS business/administrativ approach
- By Marek J. on 13-09-23
-
Fire Doesn't Innovate
- The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
- Narrated by: Kip A. Boyle
- Length: 5 hrs and 14 mins
- Release date: 14-09-19
- Language: English
-
With this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£14.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Cryptography
- By: Panos Louridas
- Narrated by: Tom Beyer
- Length: 6 hrs and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets.
-
Cryptography
- Narrated by: Tom Beyer
- Length: 6 hrs and 30 mins
- Release date: 22-10-24
- Language: English
-
We all keep secrets—from our locker codes to our passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies.
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£12.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Listening In
- Cybersecurity in an Insecure Age
- By: Susan Landau
- Narrated by: Tamara Marston
- Length: 6 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity - and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un.
-
Listening In
- Cybersecurity in an Insecure Age
- Narrated by: Tamara Marston
- Length: 6 hrs and 15 mins
- Release date: 28-11-17
- Language: English
- A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers and misinformed policymakers....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£14.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Customer Data and Privacy
- The Insights You Need from Harvard Business Review (HBR Insights Series)
- By: Harvard Business Review
- Narrated by: Christopher Grove, Janet Metzger
- Length: 2 hrs and 56 mins
- Unabridged
-
Overall
-
Performance
-
Story
Customer Data and Privacy: The Insights You Need from Harvard Business Review will help you understand the tangled interdependencies and complexities and develop strategies that allow your company to be good stewards, collecting, using, and storing customer data responsibly.
-
Customer Data and Privacy
- The Insights You Need from Harvard Business Review (HBR Insights Series)
- Narrated by: Christopher Grove, Janet Metzger
- Series: HBR Insights Series
- Length: 2 hrs and 56 mins
- Release date: 22-09-20
- Language: English
-
Customer Data and Privacy: The Insights You Need from Harvard Business Review will help you understand the tangled interdependencies and complexities and develop strategies that allow your company to be good stewards, collecting, using, and storing customer data responsibly....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£7.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
The NIST Framework (CSF) 2.0
- By: National Institute of Standards and Technology
- Narrated by: Tom Brooks
- Length: 2 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. It offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization - regardless of its size, sector, or maturity - to better understand, assess, prioritize, and communicate its cybersecurity efforts.
-
The NIST Framework (CSF) 2.0
- Narrated by: Tom Brooks
- Length: 2 hrs and 33 mins
- Release date: 02-04-24
- Language: English
-
The NIST Cybersecurity Framework (CSF) 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks.
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£6.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Foundation level, as described
- By Dale Rollinson on 26-05-25
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- Narrated by: Frank Block
- Series: NIST 800 Cybersecurity, Book 1
- Length: 1 hr and 32 mins
- Release date: 22-06-22
- Language: English
-
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2....
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£6.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-
-
-
Step-by-Step Cyber Security for Beginners
- A Practical Guide to Understanding Threats. Protecting Yourself and Your Devices in the Digital Age
- By: Ethan Ward
- Narrated by: Aaron Sinn
- Length: 4 hrs and 34 mins
- Unabridged
-
Overall
-
Performance
-
Story
In simple and easy-to-understand language, this book provides you with the knowledge and tools to recognize and counteract cyber threats, helping you navigate the digital world with confidence and security.
-
Step-by-Step Cyber Security for Beginners
- A Practical Guide to Understanding Threats. Protecting Yourself and Your Devices in the Digital Age
- Narrated by: Aaron Sinn
- Length: 4 hrs and 34 mins
- Release date: 12-12-24
- Language: English
-
In simple and easy-to-understand language, this book provides you with the knowledge and tools to recognize and counteract cyber threats, helping you navigate the digital world with confidence and security.
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to basket failed.
Please try again laterAdd to wishlist failed.
Please try again laterRemove from wishlist failed.
Please try again laterAdding to library failed
Please try againFollow podcast failed
Unfollow podcast failed
£7.99 or free with trial. Auto-renews at £8.99/month after trial. See eligibility.
-