
Cybersecurity Program Development for Business
The Essential Planning Guide
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Obtén 2 audiolibros gratis con tu prueba.
Compra ahora por $17.19
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Sean Pratt
Acerca de esta escucha
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. From beginning to end, it's a thorough overview, but it can also function as a useful reference audiobook as individual questions and difficulties arise.
- Unlike other cybersecurity books, the text is not bogged down with industry jargon
- Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs
- Shows you how to make pragmatic, rational, and informed decisions for your organization
- Written by a top-flight technologist with decades of experience and a track record of success
If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
©2018 Chris Moschovitis (P)2018 Gildan MediaLos oyentes también disfrutaron...
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- De: Thomas J. Parenty, Jack J. Domet
- Narrado por: Jonathan Todd Ross
- Duración: 5 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- De J. M. Wilson en 10-20-20
De: Thomas J. Parenty, y otros
-
Cybersecurity for Dummies
- De: Joseph Steinberg
- Narrado por: BJ Harrison
- Duración: 13 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- De Anonymous User en 07-09-21
De: Joseph Steinberg
-
The Art of Deception
- Controlling the Human Element of Security
- De: Kevin Mitnick
- Narrado por: Nick Sullivan
- Duración: 13 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- De James S. en 02-01-21
De: Kevin Mitnick
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- De: Thomas J. Parenty, Jack J. Domet
- Narrado por: Jonathan Todd Ross
- Duración: 5 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- De J. M. Wilson en 10-20-20
De: Thomas J. Parenty, y otros
-
Cybersecurity for Dummies
- De: Joseph Steinberg
- Narrado por: BJ Harrison
- Duración: 13 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- De Anonymous User en 07-09-21
De: Joseph Steinberg
-
The Art of Deception
- Controlling the Human Element of Security
- De: Kevin Mitnick
- Narrado por: Nick Sullivan
- Duración: 13 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- De James S. en 02-01-21
De: Kevin Mitnick
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- De: Christian Espinosa
- Narrado por: Kaleo Griffith
- Duración: 6 h y 54 m
- Versión completa
-
General
-
Narración:
-
Historia
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- De Jonathan en 09-01-21
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- De: Ben Malisow
- Narrado por: Daniel Henning
- Duración: 16 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Disruptive reading of URLs
- De Customer en 04-22-22
De: Ben Malisow
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- De: P. W. Singer, Allan Friedman
- Narrado por: Sean Pratt
- Duración: 11 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- De Pascal en 03-04-17
De: P. W. Singer, y otros
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- De: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrado por: Matthew E. Kelly
- Duración: 10 h y 4 m
- Versión completa
-
General
-
Narración:
-
Historia
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- De Amazon Customer en 08-24-21
De: Eric Conrad, y otros
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De: Christopher Hadnagy
- Narrado por: Christopher Hadnagy
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- De RM en 04-10-19
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Essential CISM: Updated for the 16th Edition CISM Review Manual
- De: Phil Martin
- Narrado por: Phil Martin
- Duración: 11 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
Essential CISM has been written with a single goal in mind - to present the CISM material in a way that is easy to absorb without leaving any content behind. Plenty of examples are included to drive the points home so that when it comes time to take the CISM exam, you are ready! The book is broken down into two sections. Section 1 covers basic concepts you will need to understand before hitting each domain. The CISM official exam guide is redundant across the domains, and so in this book you will encounter each topic once instead of having to rehash the same subject in different ways.
-
-
Helpful as an addition for the CISM exam Prep.
- De Alex Syvorotka en 05-06-19
De: Phil Martin
-
Cybersecurity Leadership
- Powering the Modern Organization
- De: Mansur Hasib
- Narrado por: Mansur Hasib
- Duración: 7 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process.
-
-
CIOs and CISOs should read this book...
- De Chad L Fulgham en 08-12-15
De: Mansur Hasib
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- De: Quinn Kiser
- Narrado por: Ivan Busenius
- Duración: 7 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- De Scott Redfern en 10-01-21
De: Quinn Kiser
-
ABC's of Buying a Rental Property
- How You Can Achieve Financial Freedom in Five Years
- De: Ken McElroy
- Narrado por: Garrett Sutton Esq.
- Duración: 5 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Many Americans dream of financial freedom, but they're stuck in dead-end jobs and don't know how to get there. You don't need to be one of them. If you invested $35,000 in the stock market today, it could take 52 years for that investment to grow to $1 million. But if you invested that same amount into one single-family $140,000 rental property, it would only take 19 years. With just two rental properties, you could generate $417,000 in profit in just 10 years. Skeptical?
-
-
Eureka!!!
- De K-Star en 11-24-21
De: Ken McElroy
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- De: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrado por: Gwen Bettwy
- Duración: 5 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- De SMB en 09-21-21
De: Gwen Bettwy, y otros
-
Side Hustle
- From Idea to Income in 27 Days
- De: Chris Guillebeau
- Narrado por: Chris Guillebeau
- Duración: 4 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
For some people, the thought of quitting their day job to pursue the entrepreneurial life is exhilarating. For many others, it's terrifying. After all, a stable job that delivers a regular paycheck is a blessing. And not everyone has the means or the desire to take on the risks and responsibilities of working for themselves. But what if we could quickly and easily create an additional stream of income without giving up the security of a full-time job? Enter the side hustle.
-
-
Just $100 Startup" distilled - At Double speed.
- De Daniel L en 09-25-17
De: Chris Guillebeau
Relacionado con este tema
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- De Fausto Cepeda en 04-03-19
De: Bruce Schneier
-
Human + Machine
- Reimagining Work in the Age of AI
- De: Paul R. Daugherty, H. James Wilson
- Narrado por: Jamie Renell
- Duración: 5 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
Look around you. Artificial intelligence is no longer just a futuristic notion. It's here right now - in software that senses what we need, supply chains that "think" in real time, and robots that respond to changes in their environment. Twenty-first-century pioneer companies are already using AI to innovate and grow fast. The bottom line is this: Businesses that understand how to harness AI can surge ahead. Those that neglect it will fall behind. Which side are you on?
-
-
A golf course book
- De C. Surdak en 07-30-18
De: Paul R. Daugherty, y otros
-
Driving Digital
- The Leader's Guide to Business Transformation Through Technology
- De: Isaac Sacolick
- Narrado por: Tom Parks
- Duración: 10 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
The race is on to become a digital enterprise. Every organization has a plan for updating products, technologies, and business processes. But that's not enough anymore. With disruptive startups outperforming industry stalwarts, executives everywhere are pushing greater growth and innovation. Staying competitive demands a complete digital transformation.
-
-
Best book I have read on Digital Transformation
- De Holistic Health en 10-20-17
De: Isaac Sacolick
-
The Amazon Way on IoT
- 10 Principles for Every Leader from the World's Leading Internet of Things Strategies
- De: John Rossman
- Narrado por: Christopher Lane
- Duración: 5 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
The Amazon Way on IoT is for the leader who wants to understand how the Internet of things is transforming business and society. Listeners will discover business cases, key concepts, technologies and tools to help develop, explain and execute their own IoT approach through understanding Amazon's and other leading companies sophisticated IoT technologies and strategies.
-
-
Very insightful, but quite boring
- De Riaan en 02-21-17
De: John Rossman
-
Artificial Intelligence: 101 Things You Must Know Today About Our Future
- De: Lasse Rouhiainen
- Narrado por: Rodger Paxton
- Duración: 8 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Artificial intelligence is changing our world faster than we can imagine, and it will impact every area of our lives. And this is happening whether we like it or not. You might have heard that many jobs will be replaced by automation and robots, but did you also know that at the same time a huge number of new jobs will be created by AI? This book covers many fascinating and timely topics related to artificial intelligence, including: self-driving cars, robots, chatbots, and how AI will impact the job market, business processes, and entire industries, just to name a few.
-
-
Completely useless
- De Joe V en 03-29-19
De: Lasse Rouhiainen
-
Red Team
- How to Succeed by Thinking Like the Enemy
- De: Micah Zenko
- Narrado por: Christopher Lane
- Duración: 11 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Red teaming. It is a practice as old as the Devil's Advocate, the 11th-century Vatican official charged with discrediting candidates for sainthood. Today, red teams - comprised primarily of fearless skeptics and those assuming the role of saboteurs who seek to better understand the interests, intentions, and capabilities of institutions or potential competitors - are used widely in both the public and private sector.
-
-
Repetitive
- De Pax S Whitmore en 07-12-16
De: Micah Zenko
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- De: Bruce Schneier
- Narrado por: Roger Wayne
- Duración: 8 h y 6 m
- Versión completa
-
General
-
Narración:
-
Historia
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- De Fausto Cepeda en 04-03-19
De: Bruce Schneier
-
Human + Machine
- Reimagining Work in the Age of AI
- De: Paul R. Daugherty, H. James Wilson
- Narrado por: Jamie Renell
- Duración: 5 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
Look around you. Artificial intelligence is no longer just a futuristic notion. It's here right now - in software that senses what we need, supply chains that "think" in real time, and robots that respond to changes in their environment. Twenty-first-century pioneer companies are already using AI to innovate and grow fast. The bottom line is this: Businesses that understand how to harness AI can surge ahead. Those that neglect it will fall behind. Which side are you on?
-
-
A golf course book
- De C. Surdak en 07-30-18
De: Paul R. Daugherty, y otros
-
Driving Digital
- The Leader's Guide to Business Transformation Through Technology
- De: Isaac Sacolick
- Narrado por: Tom Parks
- Duración: 10 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
The race is on to become a digital enterprise. Every organization has a plan for updating products, technologies, and business processes. But that's not enough anymore. With disruptive startups outperforming industry stalwarts, executives everywhere are pushing greater growth and innovation. Staying competitive demands a complete digital transformation.
-
-
Best book I have read on Digital Transformation
- De Holistic Health en 10-20-17
De: Isaac Sacolick
-
The Amazon Way on IoT
- 10 Principles for Every Leader from the World's Leading Internet of Things Strategies
- De: John Rossman
- Narrado por: Christopher Lane
- Duración: 5 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
The Amazon Way on IoT is for the leader who wants to understand how the Internet of things is transforming business and society. Listeners will discover business cases, key concepts, technologies and tools to help develop, explain and execute their own IoT approach through understanding Amazon's and other leading companies sophisticated IoT technologies and strategies.
-
-
Very insightful, but quite boring
- De Riaan en 02-21-17
De: John Rossman
-
Artificial Intelligence: 101 Things You Must Know Today About Our Future
- De: Lasse Rouhiainen
- Narrado por: Rodger Paxton
- Duración: 8 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Artificial intelligence is changing our world faster than we can imagine, and it will impact every area of our lives. And this is happening whether we like it or not. You might have heard that many jobs will be replaced by automation and robots, but did you also know that at the same time a huge number of new jobs will be created by AI? This book covers many fascinating and timely topics related to artificial intelligence, including: self-driving cars, robots, chatbots, and how AI will impact the job market, business processes, and entire industries, just to name a few.
-
-
Completely useless
- De Joe V en 03-29-19
De: Lasse Rouhiainen
-
Red Team
- How to Succeed by Thinking Like the Enemy
- De: Micah Zenko
- Narrado por: Christopher Lane
- Duración: 11 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Red teaming. It is a practice as old as the Devil's Advocate, the 11th-century Vatican official charged with discrediting candidates for sainthood. Today, red teams - comprised primarily of fearless skeptics and those assuming the role of saboteurs who seek to better understand the interests, intentions, and capabilities of institutions or potential competitors - are used widely in both the public and private sector.
-
-
Repetitive
- De Pax S Whitmore en 07-12-16
De: Micah Zenko
Lo que los oyentes dicen sobre Cybersecurity Program Development for Business
Con calificación alta para:
Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- BritCanuck
- 11-17-18
As an aspiring CISO, this book was GOLD!
Through this excellent work (which I now have on Audio and physical format..hmmm...maybe Kindle next?), Chris had made Cybersecurity human, none geeky and thoroughly understandable. Cybersecurity strategy has at last been humanised a d laid out in a format most anyone can grasp and action. I cannot wait to REALize what I have learned from this book. Second reading here we go!
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 2 personas
-
Total
-
Ejecución
-
Historia
- Daniel
- 02-04-20
Great read
I highly recommend this listen for anyone wanting to learn the basics in cybersecurity.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Roger Swanson
- 07-19-18
Best Reference for Cyber Program Development
This is a well-written book with lots of great guidelines and direction for solid structure and how to begin your company CyberSecurity Program.
Big thanks to Chris Moschovitis - well done by all involved.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 3 personas
-
Total
-
Ejecución
-
Historia
- Anonymous User
- 09-28-18
excellent information, actionable plan
this book was full of powerful and practical information and steps you through a very down to earth and actionable plan. the writing style was thouroughly entertaining as well.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- Amazon Customer
- 03-21-21
Solid read
My favorite narrator, story had many noteworthy sections. I have used info provided in my security planning.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- derazz
- 04-09-19
The start of a Cyber-security journey of awakening
The book has been the start of a Cyber-security journey and awakening.
Teco project, getting to Grips with Networking , the dark web and designing a TCP/IP stack.
In the age of IOT and AI/ML, a new world just opened up. enter if you dare. (lol)
In short, The book's a winner.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Spa Diva
- 03-31-24
Awesome book! Informative in a simpler form and lighter with a sense of humor along the way.
A must read/listen for anyone who wants to know more about this cyber security subject. It covers all the major issues and beyond. You get a better understanding of the topic along with other issues related with the business both internally and externally. It’s not easy to find a book with heavily technical deals that present it in a simpler and lighter way plus a sense of humor here and there. The narrator has a great sense of tone, dialogue and speaks as he talks to you directly in a voice of confidence and an informative conversation. The book provides better context than its title. Give it a try!
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Tommy Williams
- 06-03-20
CISSP written all over it!
I listened at first but then, I started to realize that Chris Moschovitis was secretly teaching the ways of the CISSP Masters. Very informative and captivating. The author knows how to bring the most difficult of areas and relate them to real world situations.
Great job Chris,
I HIGHLY recommend this book to those pursuing their CISSP certification.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 2 personas
-
Total
-
Ejecución
-
Historia
- JDValdez
- 11-29-18
Packed With Vital Cybersecurity Info
✓ [ , Wow . ] ! ! ! ! ! ! ! ! !
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- Amazon Customer
- 09-26-19
Comprehensive Book
For me, this is Insightful, Extensive, Contemporary exposé on Cybersecurity. must have hardcopy for regular reference.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña