I Spy, e-Spy: Pageturners Spy
Written by Janice Greene
Narrated by Larry McKeever
1/5
()
Currently unavailable
Currently unavailable
About this audiobook
Related to I Spy, e-Spy
YA Mysteries & Detective Stories For You
If He Had Been with Me Rating: 4 out of 5 stars4/5Asylum Rating: 3 out of 5 stars3/5Shelter: A Mickey Bolitar Novel Rating: 4 out of 5 stars4/5Seconds Away: A Mickey Bolitar Novel Rating: 4 out of 5 stars4/5The Box in the Woods Rating: 4 out of 5 stars4/5Truly Devious: A Mystery Rating: 4 out of 5 stars4/5This is Our Story Rating: 4 out of 5 stars4/5I Am the Cheese Rating: 4 out of 5 stars4/5The Hand on the Wall Rating: 4 out of 5 stars4/5Finale Rating: 4 out of 5 stars4/5Found Rating: 5 out of 5 stars5/5The Girl Who Was Supposed to Die Rating: 4 out of 5 stars4/5Nine Liars Rating: 4 out of 5 stars4/5The Safest Lies Rating: 4 out of 5 stars4/5Enola Holmes and the Elegant Escapade Rating: 5 out of 5 stars5/5The Vanishing Stair Rating: 4 out of 5 stars4/5Pride and Premeditation Rating: 4 out of 5 stars4/5The Book Jumper Rating: 4 out of 5 stars4/5The Last of August Rating: 4 out of 5 stars4/5Seven Dirty Secrets Rating: 4 out of 5 stars4/5When Rating: 4 out of 5 stars4/5All These Bodies Rating: 4 out of 5 stars4/5Enola Holmes and the Boy in Buttons Rating: 4 out of 5 stars4/5A Danger to Herself and Others Rating: 4 out of 5 stars4/5A Study in Charlotte Rating: 4 out of 5 stars4/5We Were Kings Rating: 4 out of 5 stars4/5Don't Look Back Rating: 4 out of 5 stars4/5Jackaby Rating: 4 out of 5 stars4/5Poison for Breakfast Rating: 4 out of 5 stars4/5Ink Rating: 4 out of 5 stars4/5
Related podcast episodes
#322 Tim Woods - VP of Technology Alliances at FireMon: Cyber Security, Enterprise Network Security, Leadership Podcast episode
#322 Tim Woods - VP of Technology Alliances at FireMon: Cyber Security, Enterprise Network Security, Leadership
byJoel Beasley | Modern CTO0 ratings0% found this document usefulHumanising cyber security with RMIT 0 ratings0% found this document usefulJuly 23, 2021: NSO Group says to blame its customers Saudi Aramco confirms data leak Sophos to acquire Braintrace Thanks to our episode sponsor, Varonis We all know devasting ransomware goes beyond the endpoint. Big game ransomware defense for your cloud and... Podcast episode
July 23, 2021: NSO Group says to blame its customers Saudi Aramco confirms data leak Sophos to acquire Braintrace Thanks to our episode sponsor, Varonis We all know devasting ransomware goes beyond the endpoint. Big game ransomware defense for your cloud and...
byCyber Security Headlines0 ratings0% found this document useful”Investing in Your Security Team” with Zane Gittins 0 ratings0% found this document usefulSaaSy Services and Combatting Disruption with Vignesa Moorthy 0 ratings0% found this document usefulEP153 Kevin Mandia on Cloud Breaches: New Threat Actors, Old Mistakes, and Lessons for All: Guest: , CEO at Mandiant, part of Google Cloud Topics: When you look back, what were the most surprising cloud breaches in 2023, and what can we learn from them? How were they different from the “old world” of on-prem breaches? For a... Podcast episode
EP153 Kevin Mandia on Cloud Breaches: New Threat Actors, Old Mistakes, and Lessons for All: Guest: , CEO at Mandiant, part of Google Cloud Topics: When you look back, what were the most surprising cloud breaches in 2023, and what can we learn from them? How were they different from the “old world” of on-prem breaches? For a...
byCloud Security Podcast by Google0 ratings0% found this document usefulCyber Security Priorities – The Road Ahead!: No one is secure from the relentlessly morphing and multipronged threats facing the Internet. These threats are real and must be met with a cohesive and collaborative effort from both public and private sectors to increase security. Podcast episode
Cyber Security Priorities – The Road Ahead!: No one is secure from the relentlessly morphing and multipronged threats facing the Internet. These threats are real and must be met with a cohesive and collaborative effort from both public and private sectors to increase security.
byCIO Talk Network Podcast0 ratings0% found this document usefulOpen Source Enterprise Communication Security - Ian Tien - ESW #231: Data security is more important than ever for enterprise organizations -- but in a time where data breaches have become common, it's also more challenging than ever. Mattermost co-founder and CEO Ian Tien shares how leveraging open source software can... Podcast episode
Open Source Enterprise Communication Security - Ian Tien - ESW #231: Data security is more important than ever for enterprise organizations -- but in a time where data breaches have become common, it's also more challenging than ever. Mattermost co-founder and CEO Ian Tien shares how leveraging open source software can...
byEnterprise Security Weekly (Video)0 ratings0% found this document usefulOpen Source Enterprise Communication Security - Ian Tien - ESW #231: Data security is more important than ever for enterprise organizations -- but in a time where data breaches have become common, it's also more challenging than ever. Mattermost co-founder and CEO Ian Tien shares how leveraging open source software can... Podcast episode
Open Source Enterprise Communication Security - Ian Tien - ESW #231: Data security is more important than ever for enterprise organizations -- but in a time where data breaches have become common, it's also more challenging than ever. Mattermost co-founder and CEO Ian Tien shares how leveraging open source software can...
bySecurity Weekly Podcast Network (Video)0 ratings0% found this document usefulStaying safe: How to combat growing cyberthreats: December 9, 2021, is a day that is etched into Natalia Oropeza’s memory. It all started with some initial reports of a dangerous security vulnerability known as Log4j. The following days were shaped by a race against hackers who were determined to exp ... Podcast episode
Staying safe: How to combat growing cyberthreats: December 9, 2021, is a day that is etched into Natalia Oropeza’s memory. It all started with some initial reports of a dangerous security vulnerability known as Log4j. The following days were shaped by a race against hackers who were determined to exp ...
bySecuring Digitalization0 ratings0% found this document usefulCan Cynet bring Simplicity back into Security?: Securing the internal environment from breaches is becoming increasingly complex for organizations. We keep buying security tools, deploying valuable human resource, and spending more time in fighting fires. But still, the number of breaches keep rising. Podcast episode
Can Cynet bring Simplicity back into Security?: Securing the internal environment from breaches is becoming increasingly complex for organizations. We keep buying security tools, deploying valuable human resource, and spending more time in fighting fires. But still, the number of breaches keep rising.
byCIO Talk Network Podcast0 ratings0% found this document usefulZOOMBOMBING: How to Avoid It: We talk with Tony Anscombe, cybersecurity expert and global ambassador to ESET, about fixing Zoom’s privacy and security flaws Speaking of protection, we catch up with VPNPro.com to hear why you need a VPN more than ever before (and which ones are the... Podcast episode
ZOOMBOMBING: How to Avoid It: We talk with Tony Anscombe, cybersecurity expert and global ambassador to ESET, about fixing Zoom’s privacy and security flaws Speaking of protection, we catch up with VPNPro.com to hear why you need a VPN more than ever before (and which ones are the...
byTech It Out0 ratings0% found this document usefulPrepping for Security Incidents, Automated Validation & No-Code Automation Revolution - Amitai Ratzon, Jon Check, Thomas Kinsella - ESW #319: The reality is no organization is insusceptible to a breach – and security teams, alongside the C-suite, should prepare now to make the response more seamless once a crisis does happen. Based on his experience working 1:1 with security leaders in... Podcast episode
Prepping for Security Incidents, Automated Validation & No-Code Automation Revolution - Amitai Ratzon, Jon Check, Thomas Kinsella - ESW #319: The reality is no organization is insusceptible to a breach – and security teams, alongside the C-suite, should prepare now to make the response more seamless once a crisis does happen. Based on his experience working 1:1 with security leaders in...
byEnterprise Security Weekly (Video)0 ratings0% found this document usefulPrepping for Security Incidents, Automated Validation & No-Code Automation Revolution - Amitai Ratzon, Jon Check, Thomas Kinsella - ESW #319: The reality is no organization is insusceptible to a breach – and security teams, alongside the C-suite, should prepare now to make the response more seamless once a crisis does happen. Based on his experience working 1:1 with security leaders in... Podcast episode
Prepping for Security Incidents, Automated Validation & No-Code Automation Revolution - Amitai Ratzon, Jon Check, Thomas Kinsella - ESW #319: The reality is no organization is insusceptible to a breach – and security teams, alongside the C-suite, should prepare now to make the response more seamless once a crisis does happen. Based on his experience working 1:1 with security leaders in...
bySecurity Weekly Podcast Network (Video)0 ratings0% found this document usefulRANE Insights: A Holistic Approach to Cybersecurity: When it comes to keeping a business safe from cyber attacks, it’s rarely enough to have the latest security software or even the best information technology team. What’s needed is a holistic approach - that brings in a company’s best security experts... Podcast episode
RANE Insights: A Holistic Approach to Cybersecurity: When it comes to keeping a business safe from cyber attacks, it’s rarely enough to have the latest security software or even the best information technology team. What’s needed is a holistic approach - that brings in a company’s best security experts...
byRANE Podcast Series0 ratings0% found this document usefulCyber Criminals, Biased AI & Autonomous Rockets: Things That Go Bump in the Night Podcast episode
Cyber Criminals, Biased AI & Autonomous Rockets: Things That Go Bump in the Night
byI_STREAM0 ratings0% found this document useful2058: How Trend Micro is Making the World Safer for Exchanging Digital Information: Trend Micro is a global cybersecurity leader on a mission to make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, their cybersecurity platform protects... Podcast episode
2058: How Trend Micro is Making the World Safer for Exchanging Digital Information: Trend Micro is a global cybersecurity leader on a mission to make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, their cybersecurity platform protects...
byThe Tech Talks Daily Podcast0 ratings0% found this document useful2293: Thales - The Importance of the Human Factor When Designing Technology: This episode delves into the often-overlooked human factor in cybersecurity with Amanda Widdowson, Head of Human Factors Capability at Thales. Businesses can invest significantly in cybersecurity infrastructure, but human error can undermine it.... Podcast episode
2293: Thales - The Importance of the Human Factor When Designing Technology: This episode delves into the often-overlooked human factor in cybersecurity with Amanda Widdowson, Head of Human Factors Capability at Thales. Businesses can invest significantly in cybersecurity infrastructure, but human error can undermine it....
byThe Tech Talks Daily Podcast0 ratings0% found this document usefulNovember 20, 2020: Worldwide campaign targets ZeroLogon exploit Brandon Wales takes over at CISA Maybe ransomware operators aren’t trustworthy after all? Thanks to our sponsor, Dtex Remote Workforce Security is a thing. Network detection and web proxy solutions have... Podcast episode
November 20, 2020: Worldwide campaign targets ZeroLogon exploit Brandon Wales takes over at CISA Maybe ransomware operators aren’t trustworthy after all? Thanks to our sponsor, Dtex Remote Workforce Security is a thing. Network detection and web proxy solutions have...
byCyber Security Headlines0 ratings0% found this document useful1355: The Deep Learning-Based Endpoint Threat Prevention: A.N. Ananth is the chief strategy officer of Netsurion. Podcast episode
1355: The Deep Learning-Based Endpoint Threat Prevention: A.N. Ananth is the chief strategy officer of Netsurion.
byThe Tech Talks Daily Podcast0 ratings0% found this document usefulCybersecurity Strategy and AI in 2023: #cybersecurity #ciso #ai #aisecurity In this exclusive interview, NVIDIA's Chief Security Officer, David Reber, discusses the complexity of the company's product line and its impact on security. He explains why NVIDIA’s complex hardware and software... Podcast episode
Cybersecurity Strategy and AI in 2023: #cybersecurity #ciso #ai #aisecurity In this exclusive interview, NVIDIA's Chief Security Officer, David Reber, discusses the complexity of the company's product line and its impact on security. He explains why NVIDIA’s complex hardware and software...
byCXOTalk0 ratings0% found this document usefulGet Out! The FUD Is Coming from the Inside: All links and images for this post can be found on CISO Series () On this week's CISO/Security Vendor Relationship Podcast, we're pointing fingers at practitioners, not vendors, for promoting the FUD (fear, uncertainty, and doubt) scare-a-thon. This... Podcast episode
Get Out! The FUD Is Coming from the Inside: All links and images for this post can be found on CISO Series () On this week's CISO/Security Vendor Relationship Podcast, we're pointing fingers at practitioners, not vendors, for promoting the FUD (fear, uncertainty, and doubt) scare-a-thon. This...
byCISO Series Podcast0 ratings0% found this document useful066 Securing Your Firmware: 066 Securing Your Firmware 0 ratings0% found this document usefulBreaking free from the VirusTotal silo 0 ratings0% found this document useful1368: Agile Security in Remote Working Environments: Zeev Draer from Niagara Networks Podcast episode
1368: Agile Security in Remote Working Environments: Zeev Draer from Niagara Networks
byThe Tech Talks Daily Podcast0 ratings0% found this document useful074| Do you even patch bro?: Vulnerabilities and security gaps are increasingly being identified in software and applications daily. Attackers are often quick to act when any vulnerabilities are made known - even within minutes. You may have heard of the term patching in cyber... Podcast episode
074| Do you even patch bro?: Vulnerabilities and security gaps are increasingly being identified in software and applications daily. Attackers are often quick to act when any vulnerabilities are made known - even within minutes. You may have heard of the term patching in cyber...
byCyber Security Sauna0 ratings0% found this document usefulKeep Pouring. I'll Tell You When I've Had Enough Security.: All links and images for this episode can be found on CISO Series () When do we hit the diminishing returns of too much cybersecurity? How will we know? Will a bell go off? Will our cup runneth over? This week's episode is hosted by me, (),... Podcast episode
Keep Pouring. I'll Tell You When I've Had Enough Security.: All links and images for this episode can be found on CISO Series () When do we hit the diminishing returns of too much cybersecurity? How will we know? Will a bell go off? Will our cup runneth over? This week's episode is hosted by me, (),...
byCISO Series Podcast0 ratings0% found this document usefulThe State of CyberSecurity Ops in a Ransomware Filled Hybrid Work World - David Finger - ESW #237 Podcast episode
The State of CyberSecurity Ops in a Ransomware Filled Hybrid Work World - David Finger - ESW #237
byEnterprise Security Weekly (Video)0 ratings0% found this document usefulDwayne Price: Sharing information. [Project Management] [Career Notes]: Senior technical project manager Dwayne Price takes us on his career journey from databases to project management. Podcast episode
Dwayne Price: Sharing information. [Project Management] [Career Notes]: Senior technical project manager Dwayne Price takes us on his career journey from databases to project management.
byCyberWire Daily0 ratings0% found this document usefulThe State of CyberSecurity Ops in a Ransomware Filled Hybrid Work World - David Finger - ESW #237: Ransomware is flourishing and our endpoints are scattered outside the corporate network. Visibility is a challenge in this age of decentralized corporate assets. Our discussion today will explore the problem from two sides. On the endpoint, where much... Podcast episode
The State of CyberSecurity Ops in a Ransomware Filled Hybrid Work World - David Finger - ESW #237: Ransomware is flourishing and our endpoints are scattered outside the corporate network. Visibility is a challenge in this age of decentralized corporate assets. Our discussion today will explore the problem from two sides. On the endpoint, where much...
bySecurity Weekly Podcast Network (Video)0 ratings0% found this document useful
Related articles
Lock It Down! TechLifeArticle
Lock It Down!
Aug 24, 2020
1 min readLock It Down Maximum PCArticle
Lock It Down
Jun 23, 2020
1 min readProtect Yourself TechLifeArticle
Protect Yourself
May 30, 2022
1 min readWhy Leaders Need To Take A Risk-based Approach To Data Security NZBusiness and ManagementArticle
Why Leaders Need To Take A Risk-based Approach To Data Security
Jul 21, 2021
5 min readCyber Safe Facility ManagementArticle
Cyber Safe
Dec 23, 2018
4 min read“Cloud Managed Network Gives Us Real-time Visibility” NZBusiness and ManagementArticle
“Cloud Managed Network Gives Us Real-time Visibility”
Mar 26, 2019
2 min readA Real Problem Business TodayArticle
A Real Problem
Nov 24, 2023
1 min readPlugging The Printer Security Loophole NZBusiness and ManagementArticle
Plugging The Printer Security Loophole
Jun 24, 2019
4 min readYour Best Defence Against Cyber-attacks NZBusiness and ManagementArticle
Your Best Defence Against Cyber-attacks
Jul 21, 2021
There is no better time than today to plan for how you’ll respond to a serious cyber-attack. Instigating a rock-solid cyber response plan requires identifying the risk to your business at a senior governance level, and understanding who is responsibl
3 min readWhat Is Antivirus Software? Getting Started With PC Security PCWorldArticle
What Is Antivirus Software? Getting Started With PC Security
Aug 1, 2023
7 min readGear UP South African Home OwnerArticle
Gear UP
Oct 21, 2019
2 min readWindows 10 End-of-life Security Reality Check PC Pro MagazineArticle
Windows 10 End-of-life Security Reality Check
Oct 5, 2023
Windows 10 is not yet an ex-Windows. It is not preaching to the choir eternal, and it has not ceased to be. Yet, it will soon become as dead as the parrot in that famous Monty Python sketch. So, what will this mean in terms of the security of your da
3 min readDon’t Get Hacked Architectural Review Asia PacificArticle
Don’t Get Hacked
Jun 6, 2018
4 min read2029 VISION Where Technology Is Taking Business NZBusiness and ManagementArticle
2029 VISION Where Technology Is Taking Business
May 27, 2019
6 min readStaying SAFER ONLINE This Tax Time Australian House & GardenArticle
Staying SAFER ONLINE This Tax Time
Jun 16, 2019
Statistics show Australians become more aware of the dangers of cybercrime around tax time. Maybe it’s because there’s so much personal information flying around as we all complete our online tax returns. The question is, are you about to expose your
1 min readEdgeworth Security Cowboys & IndiansArticle
Edgeworth Security
Jul 18, 2023
4 min readDETER, DETECT, DELAY: Thwarting The Digital Intruders The European Business ReviewArticle
DETER, DETECT, DELAY: Thwarting The Digital Intruders
Nov 25, 2021
6 min readWindows 10 End-of-life Security Reality Check Maximum PCArticle
Windows 10 End-of-life Security Reality Check
Jan 2, 2024
Windows 10 is not yet an ex-Windows. It is not preaching to the choir eternal, and it has not ceased to be. Yet, it will soon become as dead as the parrot in that famous Monty Python sketch. So what will this mean in terms of the security of your dat
3 min readThe Role Of AI In Cybersecurity NZBusiness and ManagementArticle
The Role Of AI In Cybersecurity
Apr 18, 2023
4 min readConclusion TechfastlyArticle
Conclusion
Jul 1, 2021
1 min readDo Limited Resources Have To Equal Poor CybersecurityFor SMBs? HWM SingaporeArticle
Do Limited Resources Have To Equal Poor CybersecurityFor SMBs?
Dec 10, 2021
4 min readTwo-Step Authentication Can Be Annoying. This Company Wants to Help. EntrepreneurArticle
Two-Step Authentication Can Be Annoying. This Company Wants to Help.
Jun 1, 2015
2 min readBoost Your Online Security MacFormatArticle
Boost Your Online Security
Oct 20, 2020
1 min readLock It Down! TechLifeArticle
Lock It Down!
May 3, 2021
11 min readCybersecurity Is Crucial MoneyWeekArticle
Cybersecurity Is Crucial
Sep 3, 2021
2 min readAt War In The Cyber World Money MagazineArticle
At War In The Cyber World
Oct 30, 2019
5 min readUnderstanding The Physical And Cyber Security Connection Facility ManagementArticle
Understanding The Physical And Cyber Security Connection
Jun 2, 2022
3 min readUnderstanding The Physical And Cyber Security Connection Facility ManagementArticle
Understanding The Physical And Cyber Security Connection
Jun 2, 2022
3 min readProtection APCArticle
Protection
Oct 4, 2021
2 min readBitdefender Antivirus Plus 2019 APCArticle
Bitdefender Antivirus Plus 2019
Jul 15, 2019
1 min read
Reviews for I Spy, e-Spy
1 rating0 reviews