Segurança Audiolivros
Audiobooks em alta
Os títulos de Segurança mais comentados e amados deste mês.
Blockchain Basics: A Non-Technical Introduction in 25 Steps Nota: 5 de 5 estrelas5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Nota: 5 de 5 estrelas5/5Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications Nota: 0 de 5 estrelas0 notasCybersecurity For Dummies Nota: 4 de 5 estrelas4/5Cybercrime Investigators Handbook Nota: 0 de 5 estrelas0 notasCybersecurity First Principles: A Reboot of Strategy and Tactics Nota: 5 de 5 estrelas5/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Nota: 5 de 5 estrelas5/5Blockchain and the Law: The Rule of Code Nota: 4 de 5 estrelas4/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Nota: 4 de 5 estrelas4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Nota: 5 de 5 estrelas5/5Threats: What Every Engineer Should Learn From Star Wars Nota: 5 de 5 estrelas5/5Bitcoin para iniciantes e inexperientes: Criptomoedas e Blockchain Nota: 5 de 5 estrelas5/5The Digital Silk Road: China's Quest to Wire the World and Win the Future Nota: 5 de 5 estrelas5/5Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Nota: 5 de 5 estrelas5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Nota: 4 de 5 estrelas4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Nota: 4 de 5 estrelas4/5How I Rob Banks: And Other Such Places Nota: 4 de 5 estrelas4/5Cybersecurity Program Development for Business: The Essential Planning Guide Nota: 5 de 5 estrelas5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Nota: 4 de 5 estrelas4/5The Art of Attack: Attacker Mindset for Security Professionals Nota: 5 de 5 estrelas5/5Practical Fraud Prevention: Fraud and AML Analytics for Fintech and eCommerce, Using SQL and Python Nota: 0 de 5 estrelas0 notasCybersecurity: The Insights You Need from Harvard Business Review Nota: 5 de 5 estrelas5/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Nota: 5 de 5 estrelas5/5Liars and Outliers: Enabling the Trust that Society Needs to Thrive Nota: 4 de 5 estrelas4/5If It's Smart, It's Vulnerable Nota: 4 de 5 estrelas4/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Nota: 5 de 5 estrelas5/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Nota: 4 de 5 estrelas4/5
Explorar mais
Vá para outra categoria e encontre a combinação certa para o seu estado de espírito:
Há mais para descobrir em Segurança
Fuja para novos audiobooks e novas aventuras.
Summary of Bruce Sterling's The Hacker Crackdown Law and Disorder on the Electronic Frontier Nota: 0 de 5 estrelas0 notasOWASP Top 10 Vulnerabilities: Beginner's Guide To Web Application Security Risks Nota: 0 de 5 estrelas0 notasCybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Nota: 0 de 5 estrelas0 notasThe Smartest Person in the Room Nota: 5 de 5 estrelas5/5Pentesting 101: Cracking Gadgets And Hacking Software Nota: 0 de 5 estrelas0 notasEthical Hacking for Beginners: Comprehensive Introduction to the World of Cybersecurity Nota: 0 de 5 estrelas0 notasThreats: What Every Engineer Should Learn From Star Wars Nota: 5 de 5 estrelas5/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Nota: 4 de 5 estrelas4/5HACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 3 BOOKS IN 1 Nota: 0 de 5 estrelas0 notasCybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity Nota: 0 de 5 estrelas0 notasTor Darknet Bundle (5 in 1): Master the Art of Invisibility Nota: 5 de 5 estrelas5/5Summary of Andy Greenberg's Sandworm Nota: 4 de 5 estrelas4/5The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Nota: 0 de 5 estrelas0 notasBuilding a Cyber Risk Management Program: Evolving Security for the Digital Age Nota: 0 de 5 estrelas0 notasTrojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Nota: 0 de 5 estrelas0 notasBEYOND BITCOIN INVESTING: Why other cryptocurrencies are so important and easy to make digital cash now Nota: 0 de 5 estrelas0 notasKali Linux CLI Boss: Novice To Command Line Maestro Nota: 0 de 5 estrelas0 notasThe Tao of Open Source Intelligence Nota: 0 de 5 estrelas0 notasHacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Nota: 0 de 5 estrelas0 notasHACKING: Hacking Firewalls & Bypassing Honeypots Nota: 5 de 5 estrelas5/5Cyber Wargaming: Research and Education for Security in a Dangerous Digital World Nota: 0 de 5 estrelas0 notasBlockchain: Everything You Need to Know About Blockchain Nota: 5 de 5 estrelas5/5Bitcoin For Beginners: Bitcoin, Bitcoin Mining, Cryptography And The Cypherpunk Movement | 2 Books In 1 Nota: 0 de 5 estrelas0 notasKey Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World Nota: 0 de 5 estrelas0 notasThe Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Nota: 0 de 5 estrelas0 notasEthical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 Nota: 0 de 5 estrelas0 notasRed Team Operations: Attack: Black Box Hacking, Social Engineering & Web App Scanning Nota: 5 de 5 estrelas5/5ISO 27001 Controls – A guide to implementing and auditing Nota: 0 de 5 estrelas0 notasTor and the Dark Art of Anonymity Nota: 5 de 5 estrelas5/5Computer Science 2.0 Beginners Crash Course - Python, Javascript, Cyber Security And Algorithms Nota: 0 de 5 estrelas0 notasAdvanced OSINT Strategies: Online Investigations And Intelligence Gathering Nota: 0 de 5 estrelas0 notasNIST Cybersecurity Framework: A pocket guide Nota: 0 de 5 estrelas0 notasISO/IEC 27001:2022: An introduction to information security and the ISMS standard Nota: 5 de 5 estrelas5/5Cryptography And Computer Science: Design Manual For Algorithms, Codes And Ciphers Nota: 0 de 5 estrelas0 notasDigital Earth: Cyber threats, privacy and ethics in an age of paranoia Nota: 0 de 5 estrelas0 notasNIST Cloud Security: Cyber Threats, Policies, And Best Practices Nota: 5 de 5 estrelas5/5Darknet: A Beginner's Guide to Staying Anonymous Online Nota: 5 de 5 estrelas5/5Governance of Enterprise IT based on COBIT 5: A Management Guide Nota: 0 de 5 estrelas0 notasIf It's Smart, It's Vulnerable Nota: 4 de 5 estrelas4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Nota: 5 de 5 estrelas5/5The Wires of War: Technology and the Global Struggle for Power Nota: 4 de 5 estrelas4/5Mind Hacking for Self-Mastery Nota: 5 de 5 estrelas5/5(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Nota: 0 de 5 estrelas0 notasCompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Nota: 5 de 5 estrelas5/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Nota: 4 de 5 estrelas4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Nota: 4 de 5 estrelas4/5The DevSecOps Playbook: Deliver Continuous Security at Speed Nota: 0 de 5 estrelas0 notasBitcoin para iniciantes e inexperientes: Criptomoedas e Blockchain Nota: 5 de 5 estrelas5/5Burners and Black Markets: How to Be Invisible on Android, Blackberry & Iphone Nota: 5 de 5 estrelas5/5Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications Nota: 0 de 5 estrelas0 notasWireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark Nota: 0 de 5 estrelas0 notasHacking for Beginners Nota: 5 de 5 estrelas5/5You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Nota: 0 de 5 estrelas0 notasBlockchain Basics: A Non-Technical Introduction in 25 Steps Nota: 5 de 5 estrelas5/5Malware Reverse Engineering: Cracking The Code Nota: 0 de 5 estrelas0 notasSocial Engineering: The Science of Human Hacking 2nd Edition Nota: 5 de 5 estrelas5/5Practical Fraud Prevention: Fraud and AML Analytics for Fintech and eCommerce, Using SQL and Python Nota: 0 de 5 estrelas0 notas8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Nota: 4 de 5 estrelas4/5The Missing Training Manual Nota: 0 de 5 estrelas0 notasA Vulnerable System: The History of Information Security in the Computer Age Nota: 5 de 5 estrelas5/5Blockchain: The Insights You Need from Harvard Business Review Nota: 4 de 5 estrelas4/5Cybersecurity Handbook for Small to Mid-size Businesses Nota: 0 de 5 estrelas0 notasSchneier on Security Nota: 4 de 5 estrelas4/5Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Nota: 0 de 5 estrelas0 notasHacking the Hacker: Learn From the Experts Who Take Down Hackers Nota: 4 de 5 estrelas4/5The CISO Evolution: Business Knowledge for Cybersecurity Executives Nota: 5 de 5 estrelas5/5Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response Nota: 0 de 5 estrelas0 notasUnmasking the Social Engineer: The Human Element of Security Nota: 5 de 5 estrelas5/5Certified Information Security Manager CISM Study Guide Nota: 0 de 5 estrelas0 notasHackers & Painters: Big Ideas from the Computer Age Nota: 4 de 5 estrelas4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Nota: 4 de 5 estrelas4/5Minar Criptomonedas Paso a Paso: Guía Completa Para Ganar Dinero con la Minería de Bitcoin y de Altcoins Nota: 0 de 5 estrelas0 notasHow I Rob Banks: And Other Such Places Nota: 4 de 5 estrelas4/5Cloud Security For Dummies Nota: 5 de 5 estrelas5/5The Real Business of Blockchain: How Leaders Can Create Value in a New Digital Age Nota: 5 de 5 estrelas5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Nota: 5 de 5 estrelas5/5Blockchain For Dummies Nota: 5 de 5 estrelas5/5Cybersecurity All-in-One For Dummies Nota: 0 de 5 estrelas0 notasCompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Nota: 5 de 5 estrelas5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Nota: 4 de 5 estrelas4/5Social Engineering: The Art of Human Hacking Nota: 5 de 5 estrelas5/5Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Nota: 5 de 5 estrelas5/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Nota: 4 de 5 estrelas4/5Alice and Bob Learn Application Security Nota: 5 de 5 estrelas5/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Nota: 4 de 5 estrelas4/5Ethical Hacking Nota: 0 de 5 estrelas0 notasCybersecurity: The Insights You Need from Harvard Business Review Nota: 5 de 5 estrelas5/5The Art of Attack: Attacker Mindset for Security Professionals Nota: 5 de 5 estrelas5/5Cybercrime Investigators Handbook Nota: 0 de 5 estrelas0 notasThe Pentester BluePrint: Starting a Career as an Ethical Hacker Nota: 5 de 5 estrelas5/5HACKING: How to Hack Web Apps Nota: 5 de 5 estrelas5/5Aprende a Invertir en Criptomonedas: 17 Trucos Para Hacer Dinero Online Desde Casa Nota: 0 de 5 estrelas0 notasCrypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Nota: 4 de 5 estrelas4/5Summary of Kevin D. Mitnick & William L. Simon’s The Art of Deception Nota: 0 de 5 estrelas0 notasAI Cybersecurity: Guardians of the Net Nota: 0 de 5 estrelas0 notasProject Zero Trust: A Story about a Strategy for Aligning Security and the Business Nota: 5 de 5 estrelas5/5El Libro Negro de Ethereum: Secretos Revelados: Desde la Inversión y Programación hasta el Futuro de la Web 3.0 Nota: 0 de 5 estrelas0 notasLiars and Outliers: Enabling the Trust that Society Needs to Thrive Nota: 4 de 5 estrelas4/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Nota: 5 de 5 estrelas5/5Blue Team Operations: Defense: Operational Security, Incident Response & Digital Forensics Nota: 0 de 5 estrelas0 notasCryptography: The Key to Digital Security, How It Works, and Why It Matters Nota: 5 de 5 estrelas5/5Ransomware Protection Playbook Nota: 5 de 5 estrelas5/5Zero Day: Novice No More: Expose Software Vulnerabilities And Eliminate Bugs Nota: 0 de 5 estrelas0 notasCybersecurity Program Development for Business: The Essential Planning Guide Nota: 5 de 5 estrelas5/5The Enigma Story: The Truth Behind the 'Unbreakable' World War II Cipher Nota: 0 de 5 estrelas0 notasA Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Nota: 0 de 5 estrelas0 notasLinux for Beginners: 37 Linux Commands you Must Know Nota: 4 de 5 estrelas4/5Cyber War: The Next Threat to National Security and What to Do About It Nota: 3 de 5 estrelas3/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Nota: 5 de 5 estrelas5/5The Digital Silk Road: China's Quest to Wire the World and Win the Future Nota: 5 de 5 estrelas5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Nota: 4 de 5 estrelas4/5Michael Saylor's Bitcoin MicroStrategy Nota: 0 de 5 estrelas0 notasBug Hunting 101: Novice To Virtuoso: Web Application Security For Ethical Hackers Nota: 0 de 5 estrelas0 notasCryptography: A Very Short Introduction Nota: 5 de 5 estrelas5/5The Art of Deception: Controlling the Human Element of Security Nota: 4 de 5 estrelas4/5OSINT Commando: Penetrating Networks With Spokeo, Spiderfoot, Seon, And Lampyre Nota: 0 de 5 estrelas0 notasCyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers Nota: 0 de 5 estrelas0 notasSummary of Ellen Notbohm's Ten Things Every Child with Autism Wishes You Knew Nota: 0 de 5 estrelas0 notasCloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Nota: 4 de 5 estrelas4/5(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Nota: 5 de 5 estrelas5/5Breached!: Why Data Security Law Fails and How to Improve It: 1st Edition Nota: 5 de 5 estrelas5/5How to Build a Cyber-Resilient Organization Nota: 0 de 5 estrelas0 notasSocial Engineering for Beginners: Manipulating Minds, Securing Systems Nota: 0 de 5 estrelas0 notasCómo protegerte del phishing. Evita que te roben tu información y tu dinero Nota: 5 de 5 estrelas5/5Security Awareness For Dummies Nota: 5 de 5 estrelas5/5Gray Hat: Vulnerability Scanning & Penetration Testing Nota: 0 de 5 estrelas0 notasEthereum: Everything You Need to Know About Ethereum Nota: 0 de 5 estrelas0 notasCybersecurity For Dummies Nota: 4 de 5 estrelas4/5Hack Your Way to Security Bundle, 2 in 1 Bundle Nota: 0 de 5 estrelas0 notasBlockchain and the Law: The Rule of Code Nota: 4 de 5 estrelas4/5The Cyber Conundrum: How Do We Fix Cybersecurity? Nota: 4 de 5 estrelas4/5Bitcoin: 2 Manuscripts: Blockchain, Cryptocurrency Nota: 0 de 5 estrelas0 notasCybersecurity Fundamentals Explained Nota: 0 de 5 estrelas0 notasThe Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Nota: 0 de 5 estrelas0 notasThe Basics of Hacking Nota: 5 de 5 estrelas5/5Bitcoin And Blockchain For Beginners: Bitcoin, Bitcoin Mining And Blockchain Basics | 2 Books In 1 Nota: 0 de 5 estrelas0 notasOSINT Cracking Tools: Maltego, Shodan, Aircrack-NG, Recon-NG Nota: 0 de 5 estrelas0 notasEthical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics | 2 Books In 1 Nota: 0 de 5 estrelas0 notasDefense In Depth: Network Security And Cyber Resilience Nota: 0 de 5 estrelas0 notasGuardians of Secrecy: Your Expert Guide to Protecting Your Confidential Information Nota: 0 de 5 estrelas0 notasThe Secret Life: Three True Stories of the Digital Age Nota: 3 de 5 estrelas3/5Nine Steps to Success: An ISO27001:2013 Implementation Overview Nota: 0 de 5 estrelas0 notasMetasploit Masterclass For Ethical Hackers: Expert Penetration Testing And Vulnerability Assessment Nota: 0 de 5 estrelas0 notasBitcoin: Everything You Need to Know About Bitcoin Nota: 0 de 5 estrelas0 notasOSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith Nota: 0 de 5 estrelas0 notasBitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Nota: 4 de 5 estrelas4/5Bitcoin: Invest In Digital Gold Nota: 0 de 5 estrelas0 notasCryptocurrency: Everything You Need to Know About Cryptocurrency Nota: 0 de 5 estrelas0 notasSummary of Andy Greenberg's Sandworm Nota: 0 de 5 estrelas0 notasDie Kunst der Anonymität im Internet: So schützen Sie Ihre Identität und Ihre Daten Nota: 0 de 5 estrelas0 notasRethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Nota: 0 de 5 estrelas0 notasCyberwatch 101: The Art Of Cyber Defense And Infrastructure Security Nota: 0 de 5 estrelas0 notasThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Nota: 0 de 5 estrelas0 notasThrough the Firewall: The Alchemy of Turning Crisis into Opportunity Nota: 5 de 5 estrelas5/5Hacking Wireless With Kali Linux: Learn Fast How To Penetrate Any Wireless Network | 2 Books In 1 Nota: 0 de 5 estrelas0 notasZero Trust Security: Building Cyber Resilience & Robust Security Postures Nota: 0 de 5 estrelas0 notasCyber Security: Essential principles to secure your organisation Nota: 5 de 5 estrelas5/5Data For the People: How to Make Our Post-Privacy Economy Work for You Nota: 3 de 5 estrelas3/5Cyber Warfare in 2022+ Nota: 0 de 5 estrelas0 notasFighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Nota: 0 de 5 estrelas0 notasCryptocurrency: 3 Manuscripts: Blockchain, Cryptocurrency, Bitcoin Nota: 3 de 5 estrelas3/5How To Protect Your Personal Computer: Your Step By Step Guide To Protecting Your Personal Computer Nota: 0 de 5 estrelas0 notas¡Que no te espíen! Las herramientas y aplicaciones imprescindibles para proteger tu privacidad en la red Nota: 0 de 5 estrelas0 notasNMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library Nota: 0 de 5 estrelas0 notasFight Off Hackers Nota: 5 de 5 estrelas5/5The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Nota: 0 de 5 estrelas0 notasISO27001/ISO27002:2013: A Pocket Guide Nota: 0 de 5 estrelas0 notasNFT: What Malevich Didn't Know Nota: 0 de 5 estrelas0 notasGuarding Against Online Identity Fraud: A Simple Guide to Online Security Nota: 0 de 5 estrelas0 notasSichere Verbindung ins Netzwerk, VPN Nota: 0 de 5 estrelas0 notasGet in the Game: How to Level Up Your Business with Gaming, Esports, and Emerging Technologies Nota: 0 de 5 estrelas0 notasThe Art of Cyber Security: A practical guide to winning the war on cyber crime Nota: 0 de 5 estrelas0 notasGuíaBurros: Ciberseguridad: Consejos para tener vidas digitales más seguras Nota: 5 de 5 estrelas5/5Burp Suite: Novice To Ninja: Pen Testing Cloud, Network, Mobile & Web Applications Nota: 0 de 5 estrelas0 notasSee Yourself in Cyber: Security Careers Beyond Hacking Nota: 0 de 5 estrelas0 notasThe Security Consultant's Handbook Nota: 0 de 5 estrelas0 notasNFT for Beginners: An Essential Guide to Understanding and Investing in Non-fungible Tokens and Crypto Art Nota: 0 de 5 estrelas0 notasThe Cybersecurity Maturity Model Certification (CMMC) – A pocket guide Nota: 0 de 5 estrelas0 notasSecurity in the Digital World Nota: 0 de 5 estrelas0 notasHow Cyber Security Can Protect Your Business: A guide for all stakeholders Nota: 0 de 5 estrelas0 notasRisk Management and ISO 31000: A pocket guide Nota: 0 de 5 estrelas0 notasYour Data, Their Billions: Unraveling and Simplifying Big Tech Nota: 4 de 5 estrelas4/5Cyber Resilience: Defence-in-depth principles Nota: 0 de 5 estrelas0 notasIT-Sicherheit: TOM's, Cybercrime, Awareness Nota: 0 de 5 estrelas0 notas
Leia o que você quiser, como quiser
Encontre milhões de e-books, audiobooks, podcasts e muito mais com um período de teste gratuito.
Apenas $11.99/mês após o período de teste gratuito. Cancele quando quiser.